Sciweavers

1701 search results - page 250 / 341
» Providing k-anonymity in data mining
Sort
View
PKDD
2010
Springer
148views Data Mining» more  PKDD 2010»
13 years 8 months ago
Exploiting Causal Independence in Markov Logic Networks: Combining Undirected and Directed Models
Abstract. A new method is proposed for compiling causal independencies into Markov logic networks (MLNs). An MLN can be viewed as compactly representing a factorization of a joint ...
Sriraam Natarajan, Tushar Khot, Daniel Lowd, Prasa...
PKDD
2010
Springer
122views Data Mining» more  PKDD 2010»
13 years 8 months ago
Exploration in Relational Worlds
Abstract. One of the key problems in model-based reinforcement learning is balancing exploration and exploitation. Another is learning and acting in large relational domains, in wh...
Tobias Lang, Marc Toussaint, Kristian Kersting
ICDM
2010
IEEE
172views Data Mining» more  ICDM 2010»
13 years 8 months ago
Learning Attribute-to-Feature Mappings for Cold-Start Recommendations
Cold-start scenarios in recommender systems are situations in which no prior events, like ratings or clicks, are known for certain users or items. To compute predictions in such ca...
Zeno Gantner, Lucas Drumond, Christoph Freudenthal...
IPPS
2010
IEEE
13 years 7 months ago
Attack-resistant frequency counting
We present collaborative peer-to-peer algorithms for the problem of approximating frequency counts for popular items distributed across the peers of a large-scale network. Our alg...
Bo Wu, Jared Saia, Valerie King
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 10 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny