Sciweavers

SDM
2009
SIAM
129views Data Mining» more  SDM 2009»
14 years 8 months ago
Scalable Distributed Change Detection from Astronomy Data Streams Using Local, Asynchronous Eigen Monitoring Algorithms.
This paper considers the problem of change detection using local distributed eigen monitoring algorithms for next generation of astronomy petascale data pipelines such as the Larg...
Kamalika Das, Kanishka Bhaduri, Sugandha Arora, We...
SDM
2009
SIAM
167views Data Mining» more  SDM 2009»
14 years 8 months ago
Detecting Communities in Social Networks Using Max-Min Modularity.
Many datasets can be described in the form of graphs or networks where nodes in the graph represent entities and edges represent relationships between pairs of entities. A common ...
Jiyang Chen, Osmar R. Zaïane, Randy Goebel
SDM
2009
SIAM
130views Data Mining» more  SDM 2009»
14 years 8 months ago
Grammar Mining.
We introduce the problem of grammar mining, where patterns are context-free grammars, as a generalization of a large number of common pattern mining tasks, such as tree, sequence ...
Luc De Raedt, Siegfried Nijssen
SDM
2009
SIAM
170views Data Mining» more  SDM 2009»
14 years 8 months ago
Mining Complex Spatio-Temporal Sequence Patterns.
Mining sequential movement patterns describing group behaviour in potentially streaming spatio-temporal data sets is a challenging problem. Movements are typically noisy and often...
Florian Verhein
SDM
2009
SIAM
108views Data Mining» more  SDM 2009»
14 years 8 months ago
Highlighting Diverse Concepts in Documents.
We show the underpinnings of a method for summarizing documents: it ingests a document and automatically highlights a small set of sentences that are expected to cover the differ...
Evimaria Terzi, Kun Liu, Tyrone Grandison
SDM
2009
SIAM
184views Data Mining» more  SDM 2009»
14 years 8 months ago
DensEst: Density Estimation for Data Mining in High Dimensional Spaces.
Subspace clustering and frequent itemset mining via “stepby-step” algorithms that search the subspace/pattern lattice in a top-down or bottom-up fashion do not scale to large ...
Emmanuel Müller, Ira Assent, Ralph Krieger, S...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 8 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
SDM
2009
SIAM
162views Data Mining» more  SDM 2009»
14 years 8 months ago
Diversity-Based Weighting Schemes for Clustering Ensembles.
Clustering ensembles has been recently recognized as an emerging approach to provide more robust solutions to the data clustering problem. Current methods of clustering ensembles ...
Andrea Tagarelli, Francesco Gullo, Sergio Greco
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 8 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 8 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu