Sciweavers

1701 search results - page 288 / 341
» Providing k-anonymity in data mining
Sort
View
ICDM
2003
IEEE
92views Data Mining» more  ICDM 2003»
14 years 3 months ago
Validating and Refining Clusters via Visual Rendering
Clustering is an important technique for understanding and analysis of large multi-dimensional datasets in many scientific applications. Most of clustering research to date has be...
Keke Chen, Ling Liu
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
12 years 5 months ago
Correlating financial time series with micro-blogging activity
We study the problem of correlating micro-blogging activity with stock-market events, defined as changes in the price and traded volume of stocks. Specifically, we collect messa...
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castill...
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 10 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
WSDM
2009
ACM
115views Data Mining» more  WSDM 2009»
14 years 4 months ago
Discovering and using groups to improve personalized search
Personalized Web search takes advantage of information about an individual to identify the most relevant results for that person. A challenge for personalization lies in collectin...
Jaime Teevan, Meredith Ringel Morris, Steve Bush
ICDM
2009
IEEE
164views Data Mining» more  ICDM 2009»
14 years 4 months ago
iTopicModel: Information Network-Integrated Topic Modeling
—Document networks, i.e., networks associated with text information, are becoming increasingly popular due to the ubiquity of Web documents, blogs, and various kinds of online da...
Yizhou Sun, Jiawei Han, Jing Gao, Yintao Yu