Sciweavers

1701 search results - page 318 / 341
» Providing k-anonymity in data mining
Sort
View
LWA
2007
13 years 8 months ago
Know the Right People? Recommender Systems for Web 2.0
Web 2.0 applications like Flickr, YouTube, or Del.icio.us are increasingly popular online communities for creating, editing and sharing content. However, the rapid increase in siz...
Stefan Siersdorfer, Sergej Sizov, Paul Clough
SPIESR
2004
127views Database» more  SPIESR 2004»
13 years 8 months ago
New perspective on visual information retrieval
Visual information retrieval (VIR) is a research area with more than 300 scientific publications every year. Technological progress lets surveys become out of date within a short ...
Horst Eidenberger
ICDE
2010
IEEE
282views Database» more  ICDE 2010»
14 years 6 months ago
Quantile-Based KNN Over Multi-Valued Objects
K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over...
Wenjie Zhang, Xuemin Lin, Muhammad Aamir Cheema, Y...
COMSUR
2008
108views more  COMSUR 2008»
13 years 6 months ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 6 months ago
Nonnegative Matrix Factorization via Rank-One Downdate
Nonnegative matrix factorization (NMF) was popularized as a tool for data mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with nonnegative entries by a produ...
Michael Biggs, Ali Ghodsi, Stephen A. Vavasis