Sciweavers

DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 10 months ago
A Combinatorial Fusion Method for Feature Construction
- This paper demonstrates how methods borrowed from information fusion can improve the performance of a classifier by constructing (i.e., fusing) new features that are combinations...
Ye Tian, Gary M. Weiss, D. Frank Hsu, Qiang Ma
DMIN
2009
121views Data Mining» more  DMIN 2009»
13 years 10 months ago
Data Mining in the Real World: Experiences, Challenges, and Recommendations
Abstract - Data mining is used regularly in a variety of industries and is continuing to gain in both popularity and acceptance. However, applying data mining methods to complex re...
Gary M. Weiss
DMIN
2009
132views Data Mining» more  DMIN 2009»
13 years 10 months ago
Understanding Support Vector Machine Classifications via a Recommender System-Like Approach
Support vector machines are a valuable tool for making classifications, but their black-box nature means that they lack the natural explanatory value that many other classifiers po...
David Barbella, Sami Benzaid, Janara M. Christense...
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 10 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 10 months ago
Efficient Record Linkage using a Double Embedding Scheme
Record linkage is the problem of identifying similar records across different data sources. The similarity between two records is defined based on domain-specific similarity functi...
Noha Adly
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 10 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
DMIN
2009
142views Data Mining» more  DMIN 2009»
13 years 10 months ago
Action Selection in Customer Value Optimization: An Approach Based on Covariate-Dependent Markov Decision Processes
Typical methods in CRM marketing include action selection on the basis of Markov Decision Processes with fixed transition probabilities on the one hand, and scoring customers separ...
Angi Roesch, Harald Schmidbauer
DMIN
2009
119views Data Mining» more  DMIN 2009»
13 years 10 months ago
Abnormal Process State Detection by Cluster Center Point Monitoring in BWR Nuclear Power Plant
This paper proposes a new method to detect abnormal process state. The method is based on cluster center point monitoring in time and is demonstrated in its application to data fro...
Jaakko Talonen, Miki Sirola
DMIN
2009
223views Data Mining» more  DMIN 2009»
13 years 10 months ago
Are Decision Trees Always Greener on the Open (Source) Side of the Fence?
- This short paper compares the performance of three popular decision tree algorithms: C4.5, C5.0, and WEKA's J48. These decision tree algorithms are all related in that C5.0 ...
Samuel Moore, Daniel D'Addario, James Kurinskas, G...
DMIN
2009
185views Data Mining» more  DMIN 2009»
13 years 10 months ago
A Sparse Coding Based Similarity Measure
In high dimensional data sets not all dimensions contain an equal amount of information and most of the time global features are more important than local differences. This makes ...
Sebastian Klenk, Gunther Heidemann