Sciweavers

ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
14 years 2 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
ICDM
2005
IEEE
138views Data Mining» more  ICDM 2005»
14 years 2 months ago
Labeling Unclustered Categorical Data into Clusters Based on the Important Attribute Values
Sampling has been recognized as an important technique to improve the efficiency of clustering. However, with sampling applied, those points which are not sampled will not have t...
Hung-Leng Chen, Kun-Ta Chuang, Ming-Syan Chen
ICDM
2005
IEEE
143views Data Mining» more  ICDM 2005»
14 years 2 months ago
A Computational Framework for Taxonomic Research: Diagnosing Body Shape within Fish Species Complexes
It is estimated that ninety percent of the world’s species have yet to be discovered and described. The main reason for the slow pace of new species description is that the scie...
Yixin Chen, Henry L. Bart Jr., Shuqing Huang, Huim...
ICDM
2005
IEEE
143views Data Mining» more  ICDM 2005»
14 years 2 months ago
Effective Estimation of Posterior Probabilities: Explaining the Accuracy of Randomized Decision Tree Approaches
There has been increasing number of independently proposed randomization methods in different stages of decision tree construction to build multiple trees. Randomized decision tre...
Wei Fan, Ed Greengrass, Joe McCloskey, Philip S. Y...
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
14 years 2 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar
ICDM
2005
IEEE
126views Data Mining» more  ICDM 2005»
14 years 2 months ago
Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. Researchers have shown that attackers can manipulate a system’s reco...
Robin D. Burke, Bamshad Mobasher, Runa Bhaumik, Ch...
ICDM
2005
IEEE
142views Data Mining» more  ICDM 2005»
14 years 2 months ago
Shortest-Path Kernels on Graphs
Data mining algorithms are facing the challenge to deal with an increasing number of complex objects. For graph data, a whole toolbox of data mining algorithms becomes available b...
Karsten M. Borgwardt, Hans-Peter Kriegel
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
14 years 2 months ago
Usage-Based PageRank for Web Personalization
Recommendation algorithms aim at proposing “next” pages to a user based on her current visit and the past users’ navigational patterns. In the vast majority of related algor...
Magdalini Eirinaki, Michalis Vazirgiannis
ICDM
2005
IEEE
185views Data Mining» more  ICDM 2005»
14 years 2 months ago
Adaptive Product Normalization: Using Online Learning for Record Linkage in Comparison Shopping
The problem of record linkage focuses on determining whether two object descriptions refer to the same underlying entity. Addressing this problem effectively has many practical ap...
Mikhail Bilenko, Sugato Basu, Mehran Sahami
ICDM
2005
IEEE
185views Data Mining» more  ICDM 2005»
14 years 2 months ago
Semi-Supervised Mixture of Kernels via LPBoost Methods
We propose an algorithm to construct classification models with a mixture of kernels from labeled and unlabeled data. The derived classifier is a mixture of models, each based o...
Jinbo Bi, Glenn Fung, Murat Dundar, R. Bharat Rao