Sciweavers

WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
14 years 3 months ago
Integration of news content into web results
Aggregated search refers to the integration of content from specialized corpora or verticals into web search results. Aggregation improves search when the user has vertical intent...
Fernando Diaz
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 3 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
WSDM
2009
ACM
113views Data Mining» more  WSDM 2009»
14 years 3 months ago
Time Will Tell: Leveraging Temporal Expressions in IR
Temporal expressions, such as between 1992 and 2000, are frequent across many kinds of documents. Text retrieval, though, treats them as common terms, thus ignoring their inherent...
Irem Arikan, Srikanta J. Bedathur, Klaus Berberich
WSDM
2009
ACM
106views Data Mining» more  WSDM 2009»
14 years 3 months ago
On Stability, Clarity, and Co-occurrence of Self-Tagging
Most studies on tags focus on collaborative tagging systems where each resource (e.g., article, photo) can be tagged by multiple users with multiple tags. The tag usage patterns i...
Aixin Sun, Anwitaman Datta
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
14 years 3 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
SAC
2009
ACM
14 years 3 months ago
Capturing truthiness: mining truth tables in binary datasets
We introduce a new data mining problem: mining truth tables in binary datasets. Given a matrix of objects and the properties they satisfy, a truth table identifies a subset of pr...
Clifford Conley Owens III, T. M. Murali, Naren Ram...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 3 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
EDBTW
2010
Springer
14 years 3 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
WSDM
2010
ACM
187views Data Mining» more  WSDM 2010»
14 years 3 months ago
Precomputing search features for fast and accurate query classification
Venkatesh Ganti, Arnd Christian König, Xiao L...
WSDM
2010
ACM
168views Data Mining» more  WSDM 2010»
14 years 3 months ago
Evolution of two-sided markets
Two-sided markets arise when two different types of users may realize gains by interacting with one another through one or more platforms or mediators. We initiate a study of the...
Ravi Kumar, Yury Lifshits, Andrew Tomkins