Sciweavers

KDD
2002
ACM
144views Data Mining» more  KDD 2002»
15 years 25 days ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
KDD
2002
ACM
127views Data Mining» more  KDD 2002»
15 years 25 days ago
Mining knowledge-sharing sites for viral marketing
Viral marketing takes advantage of networks of influence among customers to inexpensively achieve large changes in behavior. Our research seeks to put it on a firmer footing by mi...
Matthew Richardson, Pedro Domingos
KDD
2002
ACM
179views Data Mining» more  KDD 2002»
15 years 25 days ago
Combining clustering and co-training to enhance text classification using unlabelled data
In this paper, we present a new co-training strategy that makes use of unlabelled data. It trains two predictors in parallel, with each predictor labelling the unlabelled data for...
Bhavani Raskutti, Herman L. Ferrá, Adam Kow...
KDD
2002
ACM
93views Data Mining» more  KDD 2002»
15 years 25 days ago
Interactive deduplication using active learning
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...
Sunita Sarawagi, Anuradha Bhamidipaty
KDD
2002
ACM
122views Data Mining» more  KDD 2002»
15 years 25 days ago
Customer lifetime value modeling and its use for customer retention planning
We present and discuss the important business problem of estimating the effect of retention efforts on the Lifetime Value of a customer in the Telecommunications industry. We disc...
Saharon Rosset, Einat Neumann, Uri Eick, Nurit Vat...
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
15 years 25 days ago
Sequential cost-sensitive decision making with reinforcement learning
Recently, there has been increasing interest in the issues of cost-sensitive learning and decision making in a variety of applications of data mining. A number of approaches have ...
Edwin P. D. Pednault, Naoki Abe, Bianca Zadrozny
KDD
2002
ACM
134views Data Mining» more  KDD 2002»
15 years 25 days ago
Discovering word senses from text
Categories and Subject Descriptors Information Storage and Retrieval Clustering General Terms Keywords
Patrick Pantel, Dekang Lin
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
15 years 25 days ago
ANF: a fast and scalable tool for data mining in massive graphs
Graphs are an increasingly important data source, with such important graphs as the Internet and the Web. Other familiar graphs include CAD circuits, phone records, gene sequences...
Christopher R. Palmer, Phillip B. Gibbons, Christo...