Sciweavers

7163 search results - page 44 / 1433
» Privacy-Preserving Data Mining
Sort
View
ICDM
2010
IEEE
125views Data Mining» more  ICDM 2010»
13 years 7 months ago
Topic Modeling Ensembles
: Topic Modeling Ensembles Zhiyong Shen, Ping Luo, Shengwen Yang, Xukun Shen HP Laboratories HPL-2010-158 Topic model, Ensemble In this paper we propose a framework of topic model...
Zhiyong Shen, Ping Luo, Shengwen Yang, Xukun Shen
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
ECTEL
2006
Springer
14 years 1 months ago
Socially-Aware Informal Learning Support: Potentials and Challenges of the Social Dimension
With increasingly conceiving learning as a social activity, technological support must become more aware of the social context of the individual in order to be able to provide adeq...
Simone Braun, Andreas Schmidt
MDAI
2009
Springer
14 years 4 months ago
The Functionality-Security-Privacy Game
Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achi...
Josep Domingo-Ferrer
WSDM
2012
ACM
230views Data Mining» more  WSDM 2012»
12 years 5 months ago
A large-scale sentiment analysis for Yahoo! answers
Onur Kucuktunc, Berkant Barla Cambazoglu, Ingmar W...