Skip to main content

Showing 1–4 of 4 results for author: N, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:1811.07609  [pdf, other

    cs.SI cs.LG

    Outlier Aware Network Embedding for Attributed Networks

    Authors: Sambaran Bandyopadhyay, Lokesh N, M. N. Murty

    Abstract: Attributed network embedding has received much interest from the research community as most of the networks come with some content in each node, which is also known as node attributes. Existing attributed network approaches work well when the network is consistent in structure and attributes, and nodes behave as expected. But real world networks often have anomalous nodes. Typically these outliers… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: Accepted for publication in The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19)

  2. arXiv:1504.01257  [pdf, other

    cs.SE cs.DC

    Usages of Composition Search Tree in Web Service Composition

    Authors: Lakshmi H N, Hrushikesha Mohanty

    Abstract: The increasing availability of web services within an organization and on the Web demands for efficient search and composition mechanisms to find services satisfying user requirements. Often consumers may be unaware of exact service names that is fixed by service providers. Rather consumers being well aware of their requirements would like to search a service based on their commitments (inputs) an… ▽ More

    Submitted 6 April, 2015; originally announced April 2015.

    Comments: 11 Pages ISSN : 0973-8215 IK International Publishing House Pvt. Ltd., New Delhi, India

    Journal ref: International Journal of Information Processing, 9(1), 28-37, 2015

  3. arXiv:1003.2677  [pdf

    cs.IR

    Classified Ads Harvesting Agent and Notification System

    Authors: Razvi Doomun, Lollmahamod N., Auleear Nadeem, Mozafar Aukin

    Abstract: The shift from an information society to a knowledge society require rapid information harvesting, reliable search and instantaneous on demand delivery. Information extraction agents are used to explore and collect data available from Web, in order to effectively exploit such data for business purposes, such as automatic news filtering, advertisement or product searching and price comparing. In t… ▽ More

    Submitted 13 March, 2010; originally announced March 2010.

    Comments: International Conference on Information and Communication Technology for the Muslim World (ICT4M 2006), 21-23 November 2006, Kuala Lumpur, Malaysia

  4. arXiv:1001.3504  [pdf

    cs.CR

    A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining

    Authors: Mohammad Ali Kadampur, Somayajulu D. V. L. N

    Abstract: Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the ben… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010