Sciweavers

88 search results - page 12 / 18
» icdm 2010
Sort
View
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
13 years 8 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
13 years 8 months ago
Location and Scatter Matching for Dataset Shift in Text Mining
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed ...
Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 8 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
ICDM
2010
IEEE
166views Data Mining» more  ICDM 2010»
13 years 8 months ago
Exponential Family Tensor Factorization for Missing-Values Prediction and Anomaly Detection
In this paper, we study probabilistic modeling of heterogeneously attributed multi-dimensional arrays. The model can manage the heterogeneity by employing an individual exponential...
Kohei Hayashi, Takashi Takenouchi, Tomohiro Shibat...
ICDM
2010
IEEE
109views Data Mining» more  ICDM 2010»
13 years 8 months ago
Term Filtering with Bounded Error
Abstract--In this paper, we consider a novel problem referred to as term filtering with bounded error to reduce the term (feature) space by eliminating terms without (or with bound...
Zi Yang, Wei Li, Jie Tang, Juanzi Li