Sciweavers

1285 search results - page 199 / 257
» Topology and Intelligent Data Analysis
Sort
View
ISI
2008
Springer
13 years 10 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
14 years 10 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
KDD
2005
ACM
112views Data Mining» more  KDD 2005»
14 years 10 months ago
Model-based overlapping clustering
While the vast majority of clustering algorithms are partitional, many real world datasets have inherently overlapping clusters. Several approaches to finding overlapping clusters...
Arindam Banerjee, Chase Krumpelman, Joydeep Ghosh,...
KDD
2004
ACM
187views Data Mining» more  KDD 2004»
14 years 10 months ago
IMMC: incremental maximum margin criterion
Subspace learning approaches have attracted much attention in academia recently. However, the classical batch algorithms no longer satisfy the applications on streaming data or la...
Jun Yan, Benyu Zhang, Shuicheng Yan, Qiang Yang, H...
HICSS
2009
IEEE
134views Biometrics» more  HICSS 2009»
14 years 4 months ago
Exploring Two Enterprise Semantic Integration Systems
An Enterprise Semantic Integration System (ESIS) provides cross-domain and cross-department insights by normalizing and merging structured, semistructured, and unstructured data s...
Mark Ginsburg, Alex Kass, Peter Z. Yeh