Sciweavers

1701 search results - page 292 / 341
» Providing k-anonymity in data mining
Sort
View
AUSAI
2004
Springer
14 years 3 months ago
A Bayesian Metric for Evaluating Machine Learning Algorithms
How to assess the performance of machine learning algorithms is a problem of increasing interest and urgency as the data mining application of myriad algorithms grows. The standard...
Lucas R. Hope, Kevin B. Korb
DMKD
2003
ACM
114views Data Mining» more  DMKD 2003»
14 years 3 months ago
Deriving link-context from HTML tag tree
HTML anchors are often surrounded by text that seems to describe the destination page appropriately. The text surrounding a link or the link-context is used for a variety of tasks...
Gautam Pant
LREC
2008
159views Education» more  LREC 2008»
13 years 11 months ago
Language Resources and Chemical Informatics
Chemistry research papers are a primary source of information about chemistry, as in any scientific field. The presentation of the data is, predominantly, unstructured information...
C. J. Rupp, Ann A. Copestake, Peter Corbett, Peter...
CCGRID
2010
IEEE
13 years 11 months ago
A Map-Reduce System with an Alternate API for Multi-core Environments
Map-reduce framework has received a significant attention and is being used for programming both large-scale clusters and multi-core systems. While the high productivity aspect of ...
Wei Jiang, Vignesh T. Ravi, Gagan Agrawal
PVLDB
2008
137views more  PVLDB 2008»
13 years 9 months ago
EasyTicket: a ticket routing recommendation engine for enterprise problem resolution
Managing problem tickets is a key issue in the IT services industry. A large service provider may handle thousands of problem tickets from its customer on daily basis. The efficie...
Qihong Shao, Yi Chen, Shu Tao, Xifeng Yan, Nikos A...