Sciweavers

2705 search results - page 187 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
WSDM
2009
ACM
136views Data Mining» more  WSDM 2009»
14 years 5 months ago
Mining common topics from multiple asynchronous text streams
Text streams are becoming more and more ubiquitous, in the forms of news feeds, weblog archives and so on, which result in a large volume of data. An effective way to explore the...
Xiang Wang 0002, Kai Zhang, Xiaoming Jin, Dou Shen
FINTAL
2006
14 years 2 months ago
A Text Mining Approach for Definition Question Answering
This paper describes a method for definition question answering based on the use of surface text patterns. The method is specially suited to answer questions about person's po...
Claudia Denicia-Carral, Manuel Montes-y-Góm...
ACSAC
2007
IEEE
14 years 5 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
13 years 1 months ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
PR
2008
151views more  PR 2008»
13 years 10 months ago
Constraint Score: A new filter method for feature selection with pairwise constraints
Feature selection is an important preprocessing step in mining high-dimensional data. Generally, supervised feature selection methods with supervision information are superior to ...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou