Bayesian co-clustering
H Shan, A Banerjee - 2008 Eighth IEEE international …, 2008 - ieeexplore.ieee.org
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze
dyadic data connecting two entities. However, almost all existing co-clustering techniques …
dyadic data connecting two entities. However, almost all existing co-clustering techniques …
Bayesian cluster ensembles
Cluster ensembles provide a framework for combining multiple base clusterings of a dataset
to generate a stable and robust consensus clustering. There are important variants of the …
to generate a stable and robust consensus clustering. There are important variants of the …
A Bayesian latent class extension of naive Bayesian classifier and its application to the classification of gastric cancer patients
Abstract Background The Naive Bayes (NB) classifier is a powerful supervised algorithm
widely used in Machine Learning (ML). However, its effectiveness relies on a strict …
widely used in Machine Learning (ML). However, its effectiveness relies on a strict …
An algorithm for centroid-based tracking of moving objects
JC Nascimento, AJ Abrantes… - 1999 IEEE international …, 1999 - ieeexplore.ieee.org
This article addresses the problem of tracking moving objects using deformable models. A
Kalman-based algorithm is presented, inspired by a new class of constrained clustering …
Kalman-based algorithm is presented, inspired by a new class of constrained clustering …
A segment-based approach to clustering multi-topic documents
A Tagarelli, G Karypis - Knowledge and information systems, 2013 - Springer
Document clustering has been recognized as a central problem in text data management.
Such a problem becomes particularly challenging when document contents are …
Such a problem becomes particularly challenging when document contents are …
Defending shilling attacks in recommender systems using soft co‐clustering
L Yang, W Huang, X Niu - IET Information Security, 2017 - Wiley Online Library
Shilling attacks have been a significant vulnerability to collaborative filtering based
recommender systems recently. There are various studies focusing on detecting shilling …
recommender systems recently. There are various studies focusing on detecting shilling …
Mobile peer-to-peer data dissemination with resource constraints
Peer-to-peer data dissemination in a mobile ad-hoc environment is characterized by three
resource constraints, including energy, communication bandwidth, and storage. Most of the …
resource constraints, including energy, communication bandwidth, and storage. Most of the …
Discovering client and intervention patterns in home visiting data
Family home visiting is a widely accepted strategy used with disadvantaged families to
mitigate the effects of poverty. However, gaps persist in knowledge of effective intervention …
mitigate the effects of poverty. However, gaps persist in knowledge of effective intervention …
基于朴素贝叶斯与潜在狄利克雷分布相结合的情感分析
苏莹, 张勇, 胡珀, 涂新辉 - 计算机应用, 2016 - joca.cn
针对情感分析需要大量人工标注语料的难点, 提出了一种面向无指导情感分析的层次性生成模型
. 该模型将朴素贝叶斯(NB) 模型和潜在狄利克雷分布(LDA) 相结合, 仅仅需要合适的情感词典 …
. 该模型将朴素贝叶斯(NB) 模型和潜在狄利克雷分布(LDA) 相结合, 仅仅需要合适的情感词典 …
Joint naive bayes and lda for unsupervised sentiment analysis
In this paper we proposed a hierarchical generative model based on Naïve Bayes and LDA
for unsupervised sentiment analysis at sentence level and document level of granularity …
for unsupervised sentiment analysis at sentence level and document level of granularity …