Sciweavers

EDM
2009
120views Data Mining» more  EDM 2009»
13 years 5 months ago
Improving Student Question Classification
Students in introductory programming classes often articulate their questions and information needs incompletely. Consequently, the automatic classification of student questions to...
Cecily Heiner, Joseph L. Zachary
EDM
2009
114views Data Mining» more  EDM 2009»
13 years 5 months ago
Edu-mining for Book Recommendation for Pupils
This paper proposes a novel method for recommending books to pupils based on a framework called Edu-mining. One of the properties of the proposed method is that it uses only loan h...
Ryo Nagata, Keigo Takeda, Koji Suda, Jun'ichi Kake...
DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 5 months ago
A Combinatorial Fusion Method for Feature Construction
- This paper demonstrates how methods borrowed from information fusion can improve the performance of a classifier by constructing (i.e., fusing) new features that are combinations...
Ye Tian, Gary M. Weiss, D. Frank Hsu, Qiang Ma
DMIN
2009
121views Data Mining» more  DMIN 2009»
13 years 5 months ago
Data Mining in the Real World: Experiences, Challenges, and Recommendations
Abstract - Data mining is used regularly in a variety of industries and is continuing to gain in both popularity and acceptance. However, applying data mining methods to complex re...
Gary M. Weiss
DMIN
2009
132views Data Mining» more  DMIN 2009»
13 years 5 months ago
Understanding Support Vector Machine Classifications via a Recommender System-Like Approach
Support vector machines are a valuable tool for making classifications, but their black-box nature means that they lack the natural explanatory value that many other classifiers po...
David Barbella, Sami Benzaid, Janara M. Christense...
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 5 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 5 months ago
Efficient Record Linkage using a Double Embedding Scheme
Record linkage is the problem of identifying similar records across different data sources. The similarity between two records is defined based on domain-specific similarity functi...
Noha Adly
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 5 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 5 months ago
Action Selection in Customer Value Optimization: An Approach Based on Covariate-Dependent Markov Decision Processes
Typical methods in CRM marketing include action selection on the basis of Markov Decision Processes with fixed transition probabilities on the one hand, and scoring customers separ...
Angi Roesch, Harald Schmidbauer
DMIN
2009
119views Data Mining» more  DMIN 2009»
13 years 5 months ago
Abnormal Process State Detection by Cluster Center Point Monitoring in BWR Nuclear Power Plant
This paper proposes a new method to detect abnormal process state. The method is based on cluster center point monitoring in time and is demonstrated in its application to data fro...
Jaakko Talonen, Miki Sirola