Sciweavers

172 search results - page 28 / 35
» tkde 2008
Sort
View
TKDE
2008
154views more  TKDE 2008»
13 years 9 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
TKDE
2008
115views more  TKDE 2008»
13 years 9 months ago
Time-Aware Web Users' Clustering
Web users clustering is a crucial task for mining information related to users needs and preferences. Up to now, popular clustering approaches build clusters based on usage pattern...
Sophia G. Petridou, Vassiliki A. Koutsonikola, Ath...
TKDE
2008
103views more  TKDE 2008»
13 years 9 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
TKDE
2008
378views more  TKDE 2008»
13 years 9 months ago
Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases
In this paper, we propose an image semantic model based on the knowledge and criteria in the field of linguistics and taxonomy. Our work bridges the "semantic gap" by sea...
Xiaoyan Li, Lidan Shou, Gang Chen, Tianlei Hu, Jin...
TKDE
2008
119views more  TKDE 2008»
13 years 9 months ago
Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies
Abstract--Individual privacy will be at risk if a published data set is not properly deidentified. k-Anonymity is a major technique to deidentify a data set. Among a number of k-an...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...