Sciweavers

181 search results - page 24 / 37
» Recommendation in Higher Education Using Data Mining Techniq...
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 5 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 8 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng
KDD
2004
ACM
158views Data Mining» more  KDD 2004»
14 years 8 months ago
A generalized maximum entropy approach to bregman co-clustering and matrix approximation
Co-clustering is a powerful data mining technique with varied applications such as text clustering, microarray analysis and recommender systems. Recently, an informationtheoretic ...
Arindam Banerjee, Inderjit S. Dhillon, Joydeep Gho...
ERCIMDL
2010
Springer
118views Education» more  ERCIMDL 2010»
13 years 9 months ago
Relevance in Technicolor
In this article we propose the concept of relevance criteria profiles, which provide a global view of user behaviour in judging the relevance of retrieved information. We further p...
Ulises Cerviño Beresi, Yunhyong Kim, Dawei ...
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 7 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham