Sciweavers

1701 search results - page 245 / 341
» Providing k-anonymity in data mining
Sort
View
WSDM
2009
ACM
112views Data Mining» more  WSDM 2009»
14 years 5 months ago
Finding text reuse on the web
With the overwhelming number of reports on similar events originating from different sources on the web, it is often hard, using existing web search paradigms, to find the origi...
Michael Bendersky, W. Bruce Croft
ICDM
2009
IEEE
165views Data Mining» more  ICDM 2009»
14 years 5 months ago
Cross-Guided Clustering: Transfer of Relevant Supervision across Domains for Improved Clustering
—Lack of supervision in clustering algorithms often leads to clusters that are not useful or interesting to human reviewers. We investigate if supervision can be automatically tr...
Indrajit Bhattacharya, Shantanu Godbole, Sachindra...
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
14 years 5 months ago
Relevance Grounding for Planning in Relational Domains
Probabilistic relational models are an efficient way to learn and represent the dynamics in realistic environments consisting of many objects. Autonomous intelligent agents that gr...
Tobias Lang, Marc Toussaint
PKDD
2009
Springer
147views Data Mining» more  PKDD 2009»
14 years 5 months ago
Kernel Polytope Faces Pursuit
Abstract. Polytope Faces Pursuit (PFP) is a greedy algorithm that approximates the sparse solutions recovered by 1 regularised least-squares (Lasso) [4,10] in a similar vein to (Or...
Tom Diethe, Zakria Hussain
SISAP
2008
IEEE
115views Data Mining» more  SISAP 2008»
14 years 5 months ago
A Dynamic Pivot Selection Technique for Similarity Search
All pivot-based algorithms for similarity search use a set of reference points called pivots. The pivot-based search algorithm precomputes some distances to these reference points...
Benjamin Bustos, Oscar Pedreira, Nieves R. Brisabo...