Sciweavers

2705 search results - page 165 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2012
ACM
166views Data Mining» more  KDD 2012»
12 years 24 days ago
Selecting a characteristic set of reviews
Online reviews provide consumers with valuable information that guides their decisions on a variety of fronts: from entertainment and shopping to medical services. Although the pr...
Theodoros Lappas, Mark Crovella, Evimaria Terzi
SADM
2010
194views more  SADM 2010»
13 years 8 months ago
Seriation and matrix reordering methods: An historical overview
: Seriation is an exploratory combinatorial data analysis technique to reorder objects into a sequence along a one-dimensional continuum so that it best reveals regularity and patt...
Innar Liiv
CSFW
2005
IEEE
14 years 4 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
KI
2004
Springer
14 years 3 months ago
Mining Hierarchical Temporal Patterns in Multivariate Time Series
Abstract. The Unification-based Temporal Grammar is a temporal extension of static unification-based grammars. It defines a hierarchical temporal rule language to express comple...
Fabian Mörchen, Alfred Ultsch
DAWAK
2008
Springer
14 years 4 days ago
Is a Voting Approach Accurate for Opinion Mining?
In this paper, we focus on classifying documents according to opinion and value judgment they contain. The main originality of our approach is to combine linguistic pre-processing,...
Michel Plantié, Mathieu Roche, Gérar...