default search action
SIGKDD Explorations, Volume 12
Volume 12, Number 1, June 2010
- Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S. Verykios:
Providing K-Anonymity in location based services. 3-10 - Olivier Thonnard, Wim Mees, Marc Dacier:
On a multicriteria clustering approach for attack attribution. 11-20 - Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane Yung-jen Hsu, Kuan-Ta Chen:
KissKissBan: a competitive human computation game for image annotation. 21-24 - Karsten Steinhaeuser, Nitesh V. Chawla, Auroop R. Ganguly:
An exploration of climate data using complex networks. 25-32 - Galileo Mark S. Namata Jr., Lise Getoor:
Identifying graphs from noisy and incomplete data. 33-39 - Zhengzheng Xing, Jian Pei, Eamonn J. Keogh:
A brief survey on sequence classification. 40-48 - George Forman, Martin Scholz:
Apples-to-apples in cross-validation studies: pitfalls in classifier performance measurement. 49-57 - Manish Gupta, Rui Li, Zhijun Yin, Jiawei Han:
Survey on social tagging techniques. 58-72
- Mohammad Al Hasan:
Mining interesting subgraphs by output space sampling. 73-74 - Jilles Vreeken:
Making pattern mining useful. 75-76
- Sadok Ben Yahia, Jean-Marc Petit:
10th international French speaking conference on knowledge discovery and management (EGC2010): conference report. 77-79
Volume 12, Number 2, December 2010
- Christophe G. Giraud-Carrier, Margaret H. Dunham:
On the importance of sharing negative results. 3-4 - Avinash Atreya, Charles Elkan:
Latent semantic indexing (LSI) fails for TREC collections. 5-10 - Claudia Perlich, Grzegorz Swirszcz:
On cross-validation and stacking: building seemingly predictive models on random data. 11-15 - Xiaoxiao Shi, Philip S. Yu:
Limitations of matrix completion via trace norm minimization. 16-20 - Johannes Fürnkranz, Jan Frederik Sima:
On exploiting hierarchical label structure with pairwise classifiers. 21-25 - Tim Weninger, Fabio Fumarola, Rick Barber, Jiawei Han, Donato Malerba:
Unexpected results in automatic list extraction on the web. 26-30 - Ron Kohavi, Roger Longbotham:
Unexpected results in online controlled experiments. 31-35 - Josh Attenberg, Foster J. Provost:
Inactive learning?: difficulties employing active learning in practice. 36-41
- Christopher C. Yang, Hsinchun Chen:
ISI-KDD: SIGKDD workshop on intelligence and security informatics 2010. 42-43 - Valery A. Petrushin, Jia-Yu Pan, Cees G. M. Snoek:
Tenth international workshop on multimedia data mining. 44-46 - Xiaoli Z. Fern, Ian Davidson, Jennifer G. Dy:
MultiClust 2010: discovering, summarizing and using multiple clusterings. 47-49 - Varun Chandola, Olufemi A. Omitaomu, Auroop R. Ganguly, Ranga Raju Vatsavai, Nitesh V. Chawla, João Gama, Mohamed Medhat Gaber:
Knowledge discovery from sensor data (SensorKDD). 50-53 - Margaret H. Dunham, Michael Hahsler, Myra Spiliopoulou:
Novel data stream pattern mining report on the StreamKDD'10 workshop. 54-55 - Jilles Vreeken, Nikolaj Tatti, Bart Goethals:
Useful patterns (UP'10) ACM SIGKDD workshop report. 56-58 - Michael W. Mahoney:
Computation in large-scale scientific and internet data applications is a focus of MMDS 2010. 59-62 - Ulf Brefeld, Lise Getoor, Sofus A. Macskassy:
Eighth workshop on mining and learning with graphs. 63-65
- Gaston L'Huillier, Héctor Álvarez, Sebastián A. Ríos, Felipe Aguilera:
Topic-based social network analysis for virtual communities of interests in the dark web. 66-73 - Jennifer R. Kwapisz, Gary M. Weiss, Samuel Moore:
Activity recognition using cell phone accelerometers. 74-82 - Luca Becchetti, Ilaria Bordino, Stefano Leonardi, Adi Rosén:
Fully decentralized computation of aggregates over data streams. 83-91 - Tijl De Bie, Kleanthis-Nikolaos Kontonasios, Eirini Spyropoulou:
A framework for mining interesting pattern sets. 92-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.