Sciweavers

1669 search results - page 177 / 334
» SMO-Style Algorithms for Learning Using Privileged Informati...
Sort
View
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 2 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
ICDCS
2002
IEEE
14 years 1 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
CEAS
2005
Springer
14 years 1 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 8 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
WWW
2009
ACM
14 years 8 months ago
Adaptive bidding for display advertising
Motivated by the emergence of auction-based marketplaces for display ads such as the Right Media Exchange, we study the design of a bidding agent that implements a display adverti...
Arpita Ghosh, Benjamin I. P. Rubinstein, Sergei Va...