Sciweavers

128
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 18 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
136
Voted
SDM
2009
SIAM
162views Data Mining» more  SDM 2009»
16 years 18 days ago
Diversity-Based Weighting Schemes for Clustering Ensembles.
Clustering ensembles has been recently recognized as an emerging approach to provide more robust solutions to the data clustering problem. Current methods of clustering ensembles ...
Andrea Tagarelli, Francesco Gullo, Sergio Greco
126
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 18 days ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
16 years 18 days ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
SDM
2009
SIAM
119views Data Mining» more  SDM 2009»
16 years 18 days ago
Twin Vector Machines for Online Learning on a Budget.
This paper proposes Twin Vector Machine (TVM), a constant space and sublinear time Support Vector Machine (SVM) algorithm for online learning. TVM achieves its favorable scaling b...
Zhuang Wang, Slobodan Vucetic
134
Voted
SDM
2009
SIAM
205views Data Mining» more  SDM 2009»
16 years 18 days ago
Identifying Information-Rich Subspace Trends in High-Dimensional Data.
Identifying information-rich subsets in high-dimensional spaces and representing them as order revealing patterns (or trends) is an important and challenging research problem in m...
Chandan K. Reddy, Snehal Pokharkar
127
Voted
SDM
2009
SIAM
208views Data Mining» more  SDM 2009»
16 years 18 days ago
A Bayesian Approach Toward Finding Communities and Their Evolutions in Dynamic Social Networks.
Although a large body of work are devoted to finding communities in static social networks, only a few studies examined the dynamics of communities in evolving social networks. I...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
132
Voted
SDM
2009
SIAM
140views Data Mining» more  SDM 2009»
16 years 18 days ago
Straightforward Feature Selection for Scalable Latent Semantic Indexing.
Latent Semantic Indexing (LSI) has been validated to be effective on many small scale text collections. However, little evidence has shown its effectiveness on unsampled large sca...
Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen
148
Voted
SDM
2009
SIAM
164views Data Mining» more  SDM 2009»
16 years 18 days ago
Exact Discovery of Time Series Motifs.
Time series motifs are pairs of individual time series, or subsequences of a longer time series, which are very similar to each other. As with their discrete analogues in computat...
Abdullah Mueen, Eamonn J. Keogh, M. Brandon Westov...
128
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 18 days ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan