Sciweavers

10412 search results - page 1993 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
KDD
2006
ACM
159views Data Mining» more  KDD 2006»
16 years 2 months ago
Global distance-based segmentation of trajectories
This work introduces distance-based criteria for segmentation of object trajectories. Segmentation leads to simplification of the original objects into smaller, less complex primi...
Aris Anagnostopoulos, Michail Vlachos, Marios Hadj...
115
Voted
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
16 years 2 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
144
Voted
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 2 months ago
Discovering significant OPSM subspace clusters in massive gene expression data
Order-preserving submatrixes (OPSMs) have been accepted as a biologically meaningful subspace cluster model, capturing the general tendency of gene expressions across a subset of ...
Byron J. Gao, Obi L. Griffith, Martin Ester, Steve...
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
16 years 2 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
153
Voted
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 2 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
« Prev « First page 1993 / 2083 Last » Next »