Sciweavers

KDD
2006
ACM
121views Data Mining» more  KDD 2006»
14 years 11 months ago
Query-time entity resolution
The goal of entity resolution is to reconcile database references corresponding to the same real-world entities. Given the abundance of publicly available databases where entities...
Indrajit Bhattacharya, Lise Getoor, Louis Licamele
KDD
2006
ACM
176views Data Mining» more  KDD 2006»
14 years 11 months ago
A framework for analysis of dynamic social networks
Finding patterns of social interaction within a population has wide-ranging applications including: disease modeling, cultural and information transmission, and behavioral ecology...
Tanya Y. Berger-Wolf, Jared Saia
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 11 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 11 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002
KDD
2006
ACM
153views Data Mining» more  KDD 2006»
14 years 11 months ago
Spatial scan statistics: approximations and performance study
Spatial scan statistics are used to determine hotspots in spatial data, and are widely used in epidemiology and biosurveillance. In recent years, there has been much effort invest...
Deepak Agarwal, Andrew McGregor, Jeff M. Phillips,...
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 11 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 11 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
KDD
2006
ACM
159views Data Mining» more  KDD 2006»
14 years 11 months ago
Global distance-based segmentation of trajectories
This work introduces distance-based criteria for segmentation of object trajectories. Segmentation leads to simplification of the original objects into smaller, less complex primi...
Aris Anagnostopoulos, Michail Vlachos, Marios Hadj...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
14 years 11 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
KDD
2006
ACM
165views Data Mining» more  KDD 2006»
14 years 11 months ago
Outlier detection by sampling with accuracy guarantees
An effective approach to detect anomalous points in a data set is distance-based outlier detection. This paper describes a simple sampling algorithm to efficiently detect distance...
Mingxi Wu, Chris Jermaine