Sciweavers

TKDE
2008
96views more  TKDE 2008»
13 years 11 months ago
A Scrambling Method for Fingerprint Positioning Based on Temporal Diversity and Spatial Dependency
Signal strength fluctuation is one of the major problems in a fingerprint-based localization system. To alleviate this problem, we propose a scrambling method to exploit temporal d...
Sheng-Po Kuo, Yu-Chee Tseng
TKDE
2008
133views more  TKDE 2008»
13 years 11 months ago
Streaming Time Series Summarization Using User-Defined Amnesic Functions
The past decade has seen a wealth of research on time series representations, because the manipulation, storage, and indexing of large volumes of raw time series data is impractica...
Themis Palpanas, Michail Vlachos, Eamonn J. Keogh,...
TKDE
2008
115views more  TKDE 2008»
13 years 11 months ago
Time-Aware Web Users' Clustering
Web users clustering is a crucial task for mining information related to users needs and preferences. Up to now, popular clustering approaches build clusters based on usage pattern...
Sophia G. Petridou, Vassiliki A. Koutsonikola, Ath...
TKDE
2008
110views more  TKDE 2008»
13 years 11 months ago
Integrating Data Warehouses with Web Data: A Survey
Juan Manuel Pérez, Rafael Berlanga Llavori,...
TKDE
2008
154views more  TKDE 2008»
13 years 11 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
TKDE
2008
158views more  TKDE 2008»
13 years 11 months ago
Hierarchical Clustering of Time-Series Data Streams
This paper presents a time series whole clustering system that incrementally constructs a tree-like hierarchy of clusters, using a top-down strategy. The Online Divisive-Agglomera...
Pedro Pereira Rodrigues, João Gama, Jo&atil...
TKDE
2008
177views more  TKDE 2008»
13 years 11 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TKDE
2008
111views more  TKDE 2008»
13 years 11 months ago
Text Clustering with Feature Selection by Using Statistical Data
Abstract-- Feature selection is an important method for improving the efficiency and accuracy of text categorization algorithms by removing redundant and irrelevant terms from the ...
Yanjun Li, Congnan Luo, Soon M. Chung
TKDE
2008
123views more  TKDE 2008»
13 years 11 months ago
Explaining Classifications For Individual Instances
We present a method for explaining predictions for individual instances. The presented approach is general and can be used with all classification models that output probabilities...
Marko Robnik-Sikonja, Igor Kononenko
TKDE
2008
152views more  TKDE 2008»
13 years 11 months ago
SRDA: An Efficient Algorithm for Large-Scale Discriminant Analysis
Linear Discriminant Analysis (LDA) has been a popular method for extracting features that preserves class separability. The projection functions of LDA are commonly obtained by max...
Deng Cai, Xiaofei He, Jiawei Han