Sciweavers

13414 search results - page 2540 / 2683
» The distributed boosting algorithm
Sort
View
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
16 years 3 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
153
Voted
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 3 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
153
Voted
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 3 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
139
Voted
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
16 years 3 months ago
Using retrieval measures to assess similarity in mining dynamic web clickstreams
While scalable data mining methods are expected to cope with massive Web data, coping with evolving trends in noisy data in a continuous fashion, and without any unnecessary stopp...
Olfa Nasraoui, Cesar Cardona, Carlos Rojas
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 3 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
« Prev « First page 2540 / 2683 Last » Next »