Show all resources, publications only, all other resources
Order by date title download citation
Pages 1, 2, 3, 4, 5, 6

Page 4: Showing 30 out of 156 resources

  1. Deng Cai, Qiaozhu Mei, ChengXiang Zhai, "Modeling Hidden Topics on Document Manifold", Article, 2008 ACM Conf. on Information and Knowledge Management (CIKM'08), Napa Valley, CA, October 15, 2008, 435 downloads.
  2. Jing Gao, Guofei Jiang, Haifeng Chen, Jiawei Han, "Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems", InProceedings, 2009 Int. Conf. on Distributed Computing Systems, June 30, 2009, 341 downloads.
  3. Marisa Thoma, Hong Cheng, Arthur Gretton, Jiawei Han, Hans-Peter Kriegel, Alexander J Smola, Le Song, Philip S Yu, Xifeng Yan, Karsten M Borgwardt, "Near-Optimal Supervised Feature Selection among Frequent Subgraphs", InProceedings, SIAM Int. Conf. on Data Mining (SDM'09, April 02, 2009, 324 downloads.
  4. Jim Parker, "Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks", PhdThesis, University of Maryland, Baltimore County, October 23, 2008.
  5. Chen Chen, Cindy Xide Lin, Xifeng Yan, Jiawei Han, "On Effective Presentation of Graph Patterns: A Structural Representative Approach`", InProceedings, ACM Conf. on Information and Knowledge Management (CIKM'08),, October 02, 2008, 414 downloads.
  6. Kun Liu, Chris Giannella, Hillol Kargupta, "On the Privacy of Euclidean Distance Preserving Data Perturbations", InProceedings, IEEE Transactions on Knowledge and Data Engineering, October 18, 2008.
  7. Wenjia Li, Anupam Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, Proceedings of the 10th International Conference on Mobile Data Management (MDM 2009), May 18, 2009, 134 downloads.
  8. Anupam Joshi, Wenjia Li, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", Article, 10th International Conference on Mobile Data Management (MDM 2009), May 18, 2009, 795 downloads.
  9. Kanishka Bhaduri, Kamalika Das, Hillol Kargupta, "Peer-to-Peer Data Mining", Article, Autonomous Intelligent Systems: Agents and Data Mining. V. Gorodetsky, C. Zhang, V. Skormin, L. Cao (Editors), LNAI 4476, Springer. pp. 1-10. 2007, November 18, 2007.
  10. Sangkyum Kim, Jaebum Kim, Younhee Ko, Seung Won Hwang, Jiawei Han, "PerRank: Personalized Rank Retrieval with Categorical and Numerical Attributes", Proceedings, 2008 Int. Conf. on Web-Age Information Management (WAIM'08), Zhangjiajie, China, July 2008, July 02, 2008.
  11. Mummoorthy Murugesan, Christopher W. Clifton, "Plausibly Deniable Search", InProceedings, Proceedings of the Workshop on Secure Knowledge Management (SKM 2008), November 03, 2008, 1320 downloads.
  12. Wenjia Li, Anupam Joshi, Tim Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, August 29, 2009.
  13. Kun Liu, Kamalika Das, Tyrone Grandison, Hillol Kargupta, "Preserving Data Analysis on Graphs and Social Networks", Article, Next Generation Data Mining. Edited by Hillol Kargupta, Jiawei Han, Philip Yu, Rajeev Motwani, and Vipin Kumar, CRC Press, 2008, November 18, 2008.
  14. Aggelos Kiayias, Shouhuai Xu, Moti Yung, "Privacy Preserving Data Mining within Anonymous Credential Systems", InProceedings, International Conference on Security and Cryptography for Networks (SCN’08), LNCS 5229, pp 57-76, November 30, 2008.
  15. Li Liu, Murat Kantarcioglu, Xiaohu Li, "Privacy Preserving Decision Tree Mining from Perturbed Data", InProceedings, Hawaii International International Conference on Systems Science, January 05, 2009, 408 downloads.
  16. Kamalika Das, Kanishka Bhaduri, Hillol Kargupta, "Privacy Preserving Local Asynchronous Algorithm for Feature Selection in a Peer-to-Peer Network", Article, Knowledge and Information Systems, July 20, 2010.
  17. Kamalika Das, Hillol Kargupta, Kanishka Bhaduri, "Privacy Preserving Local Asynchronous Algorithm for Feature Selection in a Peer-to-Peer Network", Article, November 30, 2008.
  18. Tianyi Wu, Dong Xin, Qiaozhu Mei, Jiawei Han, "Promotion Analysis in Multi-Dimensional Space", InProceedings, 2009 Int. Conf. on Very Large Data Bases, August 21, 2009, 317 downloads.
  19. Kevin K Nam, Mark S Ackerman, Lada Adamic, "Questions in, Knowledge iN? A Study of Naver’s Question Answering Community", InProceedings, Conference on Human Factors in Computing Systems, CHI 09, April 04, 2009, 897 downloads.
  20. Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin, Hong Cheng, Tianyi Wu, "RankClus: Integrating Clustering with Ranking for Heterogeneous Information Network Analysis", InProceedings, Int. Conf. on Extending DataBase Technology (EDBT'09, March 02, 2009, 566 downloads.
  21. Yizhou Sun, Jiawei Han, Peixiang Zhao, Zhijun Yin, Hong Cheng, Tianyi Wu, "RankClus: Integrating Clustering with Ranking for Heterogeneous Information Network Analysis", InProceedings, Proc. 2009 Int. Conf. on Extending Data Base Technology (EDBT'09), Saint-Petersburg, Russia, Mar. 2009, March 01, 2009.
  22. Yizhou Sun, Yintao Yu, Jiawei Han, "Ranking-Based Clustering of Heterogeneous Information Networks with Star Network Schema", InProceedings, Proc. 2009 ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'09), August 30, 2009, 1298 downloads.
  23. Tianyi Wu, Yizhou Sun, Cuiping Li, Jiawei Han, "Region-based Online Promotion Analysis", InProceedings, Proceedings of the 13th International Conference on Extending Database Technology (EDBT 2010), March 22, 2010, 335 downloads.
  24. Jiawei Han, Jing Gao, "Research Challenges for Data Mining in Science and Engineering", InBook, Next Generation of Data Mining, June 30, 2009.
  25. Qun ni, Elisa Bertino, Jorge Lobo, "Risk-Based Access Control Systems Built of Fuzzy Inferences", InProceedings, Proc. of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS), April 13, 2010, 2268 downloads.
  26. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 01, 2008, 923 downloads.
  27. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H Winsborough, Xiaohu Li, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 11, 2008, 1534 downloads.
  28. Xiaolei Li, Jiawei Han, Zhijun Yin, Jae-Gil Lee, Yizhou Sun, "Sampling Cube: A Framework for Statistical OLAP over Sampling Data", InProceedings, ACM SIGMOD Int. Conf. on Management of Data (SIGMOD'08), June 02, 2008, 518 downloads.
  29. Hillol Kargupta, Chris Giannella, Kirk Borne, Wesley Griffin, Sugandha Arora, Kanishka Bhaduri, Kamalika Das, "Scalable Distributed Change Detection from Astronomy Data Streams using Local, Asynchronous Eigen Monitoring Algorithms", Article, Ninth SIAM International Conference on Data Mining (SDM), November 01, 2009, 563 downloads.
  30. Kamalika Das, Kanishka Bhaduri, Sugandha Arora, Wesley Griffin, Kirk Borne, Chris Giannella, Hillol Kargupta, "Scalable Distributed Change Detection from Astronomy Data Streams using Local, Asynchronous Eigen Monitoring Algorithms", Article, 2009 SIAM Data Mining Conference, November 30, 2008.
Pages 1, 2, 3, 4, 5, 6