the United States now faces a further deep underlying worry: that paramilitary groups worldwide are ever more aware that their most effective impact might come less from laying improvised-explosive devices (IEDs) to disable small military units than by st
This dissertations presents an algorithm on the webgraph for finding dense bipartite graphs wich represents web-communities.
By performing further steps of the algorithm several levels of communities are recognized which can be related to communites of former levels.
professor of Robotics and Computer Science at the School of Computer Science, Carnegie Mellon University. My main research interest is data mining...
During my teaching at CMU I've accumulated quite a number of introductory and advanced teaching materials about Data Mining, Machine Learning and Algorithms for AI. Click here for a set of Data Mining tutorials. In addition, some of the course links below can take you to additional teaching and learning materials.
Business narrative is a set of techniques based on the collection and interpretation of stories collected from a workplace. This technique is most effective when applied to seemingly intractable problems such as culture change, trust, innovation, leadersh
Using RhNav - Rhizome Navigation I wrote a data aggregator for Technorati's API. The first result is a video which visualizes blog domains by analysing Technorati's Cosmos (the blogs which link to a particular URL). The video is a screencast of RhNav fetc
President Condé of Guinea at Davos , Jan 2014 (Guardian 22.1.14): "... we live in a global economy. We simply can't deal with the network of corruption embedded in a few key western institutions from a distance of nearly 3,000 miles. These corrupt practitioners operate from the west, but their practices are global and require a global response. Only tighter, more responsive and highly co-ordinated action between law enforcement authorities in both developing nations and the world's financial centres will be effective... With international legal co-operation, Guinea will soon be announcing the outcome of an investigation into some of the most disturbing allegations of mining corruption in Africa's history. I ask other countries to do the same with their own financial institutions."
Graph mining refers to extracting knowledge from massive graphs. The data sets of telephone calls we see at AT&T can be viewed as a single graph, with several hundred million phone numbers as nodes, and calls between phone numbers as edges. It is a giant social network, like an internet connections graph or a rich citation network.
Christine Marie, in Socialist Action, February 5, 2013: "The profits from France’s mines in Niger have been the target of the MNJ, the Niger Movement for Justice. The MNJ is a mostly Tuareg group that has been demanding a share of the revenues and an environmental cleanup. Kidal, one of the northern Malian towns recently taken by French forces, and the heart of Tuareg spiritual life, is at the center of a uranium-prospecting project given a 2007 go-ahead by the Malian government of over 20,000 square kilometers. Oklo Resources was due, as late as last October, to start drilling in May 2013. Malian uranium reserves have been estimated at 5200 tons"
Commodities – Switzerland’s most dangerous business’ paints an equally all-embracing and detailed picture of the powerful industry which is one of the biggest winners from globalisation and whose dealings often lead into dangerous grey areas. By means of
"The biggest Brazilian investor in Africa - and one of the biggest investors in the continent from anywhere - is Companhia Vale do Rio Doce, which is usually known as Vale. It is one of the three biggest mining companies in the world and is the world's biggest iron ore miner, controlling about 27% of the global market. It also produces coal, nickel, copper, bauxite, alumina, aluminium and a wide range of other commodities. As a result of the needs of its mining operations, it also invests heavily in power plants, railways and port infrastructure. Vale currently has investments totalling $7.7bn in nine African countries and plans to invest more than $18bn in Africa over the next five years but much will depend on the direction of global markets over that time." "The firm's biggest investment, however, is its Moatize coal mining project in the Moatize Basin of Tete Province in northwestern Mozambique."
The Kaiser plan, masterminded by ten experts who hopscotched the country for six weeks, foresees harnessing the power of the crocodile-infested Volta River to work aluminum plants. First step is to build a 230-ft.-high dam near Kosombo (see map), 60 miles
In 1999, Cameco set up a subsidiary, Cameco Europe Ltd., in low-tax Zug, Switzerland. Cameco then signed a 17-year deal to take the uranium it produces in Canada, sell it to Cameco Europe, and have Cameco Europe make the final sale to the end customers all across the world.
In the Censored News pick for the Best of the Best in 2011, Wikileaks claims first prize. Wikileaks exposed the US corporate schemes, espionage, promotion of mining and efforts globally to halt passage of the UN Declaration on the Rights of Indigenous Peoples.
CiteSeerX - Document Details (Isaac Councill, Lee Giles): Sequences of events describing the behavior and actions of users or systems can be collected in several domains. We consider the problem of discovering frequently occurring episodes in such sequences. An episode is defined to be a collection of events that occur relatively close to each other in a given partial order. Once such episodes are known, one can produce rules for describing or predicting the behavior of the sequence. We give efficient algorithms for the discovery of all frequent episodes from a given class of episodes, and present extensive experimental results. The methods are in use in telecommunication alarm management.
DDM algorithms for mining large distributed data sources,DDM algorithms for monitoring data streams, Privacy preserving distributed multi-party data mining;Sensor networks, Grid mining, mobile/wireless;applications, privacy preserving security-related
Uno degli argomenti più interessanti oggi, per chi vuole lavorare e guadagnare online in maniera seria e professionale, è misurare la reputazione online che
BBC News forum posts: 2,594,745 comments from selected BBC News forums and > 1,000 human classified sentiment strengths with a postive strength of 1-5 and a negative strength of 1-5. The classification is the average of three human classifiers.
Digg post comments: 1,646,153 comments on Digg posts (typically highlighting news or technology stories) and > 1,000 human classified sentiment strengths with a postive strength of 1-5 and a negative strength of 1-5. The classification is the average of three human classifiers.
MySpace (social network site) comments: six sets of systematic samples (3 for the US and 3 for the UK) of all comments exchanged between pairs of friends (about 350 pairs for each UK sample and about 3,500 pairs for each US sample) from a total of >100,000 members and > 1,000 human classified sentiment strengths with a postive strength of 1-5 and a negative strength of 1-5. The classification is the average of three human classifiers.
Data mining (DM), also known as Knowledge-Discovery in Databases (KDD) or Knowledge-Discovery and Data Mining (KDD), is the process of automatically searching large volumes of data for patterns. Data mining is a fairly recent and contemporary topic in computer science. However, Data mining applies many older computational techniques from statistics, information retrieval, machine learning and pattern recognition.
K. Pandey, R. Yadu, A. Dwivedi, und P. Shukla. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2):
456--460(Februar 2015)
J. Eggermont, A. Eiben, und J. van
Hemert. Advances in Intelligent Data Analysis, Third
International Symposium, IDA-99, Volume 1642 von LNCS, Seite 281--290. Amsterdam, The Netherlands, Springer-Verlag, (9--11 August 1999)
C. Zhai, A. Velivelli, und B. Yu. Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seite 743--748. New York, NY, USA, ACM, (2004)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), Seite 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, Seite 372-377. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), Seite 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, und F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, Seite 372-377. AAAI Press, (2009)
N. Fanizzi, und C. d'Amato. Proceedings of the 16th International Symposium on Methodologies for Intelligent Systems (ISMIS 2006), Volume 4203 von Lecture Notes in Artificial Intelligence, Seite 322--331. Bari, Italy, Springer, (2006)
A. Stepinski, und V. Mittal. Proceedings of the ACM Special Interest Group on Information Retrieval
(SIGIR), Seite 807--808. New York, NY, USA, ACM Press, (2007)
D. German, D. Cubranić, und M. Storey. MSR '05: Proceedings of the 2005 international workshop on Mining software repositories, Seite 1--5. New York, NY, USA, ACM, (2005)