Sciweavers

ICDM
2009
IEEE
89views Data Mining» more  ICDM 2009»
13 years 6 months ago
Discovering Domain Specific Concepts within User-Generated Taxonomies
Jonathan Klinginsmith, Malika Mahoui, Yuqing Wu, J...
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
13 years 6 months ago
A Practical Differentially Private Random Decision Tree Classifier
In this paper, we study the problem of constructing private classifiers using decision trees, within the framework of differential privacy. We first construct privacy-preserving ID...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
ICDM
2009
IEEE
147views Data Mining» more  ICDM 2009»
13 years 6 months ago
Greedy Optimization for Contiguity-Constrained Hierarchical Clustering
The discovery and construction of inherent regions in large spatial datasets is an important task for many research domains such as climate zoning, eco-region analysis, public heal...
Diansheng Guo
ICDM
2009
IEEE
161views Data Mining» more  ICDM 2009»
13 years 6 months ago
Understanding Climate Change Patterns with Multivariate Geovisualization
Climate change has been a challenging and urgent research problem for many related research fields. Climate change trends and patterns are complex, which may involve many factors a...
Hai Jin, Diansheng Guo
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
13 years 6 months ago
Pattern Mining over Star Schemas in the Onto4AR Framework
Storing data according to the multidimensional model, in particular following star schemas, has demonstrated to be one of the most adequate forms to ease the exploration of data. ...
Cláudia Antunes
ICDM
2009
IEEE
176views Data Mining» more  ICDM 2009»
13 years 6 months ago
SISC: A Text Classification Approach Using Semi Supervised Subspace Clustering
Text classification poses some specific challenges. One such challenge is its high dimensionality where each document (data point) contains only a small subset of them. In this pap...
Mohammad Salim Ahmed, Latifur Khan
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 6 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
13 years 6 months ago
Analyzing Abnormal Events from Spatio-temporal Trajectories
Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is capture...
Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong-Li L...
ICDM
2009
IEEE
138views Data Mining» more  ICDM 2009»
13 years 6 months ago
Semantic-Rich Markov Models for Web Prefetching
Abstract--Domain knowledge for web applications is currently being made available as domain ontology with the advent of the semantic web, in which semantics govern relationships am...
Nizar R. Mabroukeh, Christie I. Ezeife
ICDM
2009
IEEE
138views Data Mining» more  ICDM 2009»
13 years 6 months ago
Accurate Discovery of Valid Convoys from Moving Object Trajectories
Given a set of moving object trajectories, it is of interest to find a group of objects, called a convoy, that are spatially density-connected for a certain duration of time. Howev...
Hyunjin Yoon, Cyrus Shahabi