Sciweavers

1701 search results - page 243 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2006
ACM
185views Data Mining» more  KDD 2006»
14 years 11 months ago
How to Define Searching Sessions on Web Search Engines
We investigate three methods for defining a session on Web search engines. We examine 2,465,145 interactions from 534,507 Web searchers. We compare defining sessions using: 1) Int...
Bernard J. Jansen, Amanda Spink, Vinish Kathuria
KDD
2005
ACM
117views Data Mining» more  KDD 2005»
14 years 11 months ago
Rule extraction from linear support vector machines
We describe an algorithm for converting linear support vector machines and any other arbitrary hyperplane-based linear classifiers into a set of non-overlapping rules that, unlike...
Glenn Fung, Sathyakama Sandilya, R. Bharat Rao
KDD
2002
ACM
110views Data Mining» more  KDD 2002»
14 years 11 months ago
A model for discovering customer value for E-content
There exists a huge demand for multimedia goods and services in the Internet. Currently available bandwidth speeds can support sale of downloadable content like CDs, e-books, etc....
Srinivasan Jagannathan, Jayanth Nayak, Kevin C. Al...
KDD
2002
ACM
197views Data Mining» more  KDD 2002»
14 years 11 months ago
SimRank: a measure of structural-context similarity
The problem of measuring "similarity" of objects arises in many applications, and many domain-specific measures have been developed, e.g., matching text across documents...
Glen Jeh, Jennifer Widom
KDD
2002
ACM
119views Data Mining» more  KDD 2002»
14 years 11 months ago
Evaluating classifiers' performance in a constrained environment
In this paper, we focus on methodology of finding a classifier with a minimal cost in presence of additional performance constraints. ROCCH analysis, where accuracy and cost are i...
Anna Olecka