Sciweavers

1701 search results - page 249 / 341
» Providing k-anonymity in data mining
Sort
View
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
14 years 1 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
KDD
2010
ACM
265views Data Mining» more  KDD 2010»
13 years 12 months ago
Scalable influence maximization for prevalent viral marketing in large-scale social networks
Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set of seed nodes in a social network that maximizes the spread of influe...
Wei Chen, Chi Wang, Yajun Wang
SDM
2010
SIAM
191views Data Mining» more  SDM 2010»
13 years 11 months ago
Active Ordering of Interactive Prediction Tasks
Many applications involve a set of prediction tasks that must be accomplished sequentially through user interaction. If the tasks are interdependent, the order in which they are p...
Abhimanyu Lad, Yiming Yang
SDM
2008
SIAM
150views Data Mining» more  SDM 2008»
13 years 11 months ago
A Stagewise Least Square Loss Function for Classification
This paper presents a stagewise least square (SLS) loss function for classification. It uses a least square form within each stage to approximate a bounded monotonic nonconvex los...
Shuang-Hong Yang, Bao-Gang Hu
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
13 years 11 months ago
Maximizing the Area under the ROC Curve with Decision Lists and Rule Sets
Decision lists (or ordered rule sets) have two attractive properties compared to unordered rule sets: they require a simpler classification procedure and they allow for a more co...
Henrik Boström