Sciweavers

446 search results - page 52 / 90
» Randomization in Privacy-Preserving Data Mining
Sort
View
KDD
2010
ACM
318views Data Mining» more  KDD 2010»
13 years 8 months ago
DivRank: the interplay of prestige and diversity in information networks
Information networks are widely used to characterize the relationships between data items such as text documents. Many important retrieval and mining tasks rely on ranking the dat...
Qiaozhu Mei, Jian Guo, Dragomir R. Radev
AUSDM
2006
Springer
144views Data Mining» more  AUSDM 2006»
14 years 1 months ago
Mining Quantitative Association Rules in Protein Sequences
Abstract. Lot of research has gone into understanding the composition and nature of proteins, still many things remain to be understood satisfactorily. It is now generally believed...
Nitin Gupta, Nitin Mangal, Kamal Tiwari, Pabitra M...
ILP
2007
Springer
14 years 4 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
ADMA
2009
Springer
246views Data Mining» more  ADMA 2009»
14 years 4 months ago
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach
Image spam is a new trend in the family of email spams. The new image spams employ a variety of image processing technologies to create random noises. In this paper, we propose a s...
Yan Gao, Ming Yang, Alok N. Choudhary
ICDM
2008
IEEE
168views Data Mining» more  ICDM 2008»
14 years 4 months ago
Measuring Proximity on Graphs with Side Information
This paper studies how to incorporate side information (such as users’ feedback) in measuring node proximity on large graphs. Our method (ProSIN) is motivated by the well-studie...
Hanghang Tong, Huiming Qu, Hani Jamjoom