Nina Mishra

According to our database1, Nina Mishra authored at least 44 papers between 1994 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
SpotLight: Detecting Anomalies in Streaming Graphs.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Semi-Supervised Learning on Data Streams via Temporal Label Propagation.
Proceedings of the 35th International Conference on Machine Learning, 2018

2016
Equality and Social Mobility in Twitter Discussion Groups.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

Robust Random Cut Forest Based Anomaly Detection on Streams.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Clustering Data Streams.
Proceedings of the Data Stream Management - Processing High-Speed Data Streams, 2016

2014
Circumlocution in diagnostic medical queries.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Time-critical search.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Ranking Twitter discussion groups.
Proceedings of the second ACM conference on Online social networks, 2014

2013
Denials leak information: Simulatable auditing.
J. Comput. Syst. Sci., 2013

Group chats on Twitter.
Proceedings of the 22nd International World Wide Web Conference, 2013

Estimating the relative utility of networks for predicting user activities.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Privacy via the Johnson-Lindenstrauss Transform
CoRR, 2012

Domain bias in web search.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

Predicting Consumer Behavior in Commerce Search.
Proceedings of the 29th International Conference on Machine Learning, 2012

2011
Shopping for products you don't know you need.
Proceedings of the Forth International Conference on Web Search and Web Data Mining, 2011

2010
Secure Computation of the Median (and Other Elements of Specified Ranks).
J. Cryptology, 2010

Adapting to the Shifting Intent of Search Queries
CoRR, 2010

2009
Releasing search queries and clicks privately.
Proceedings of the 18th International Conference on World Wide Web, 2009

Generating labels from clicks.
Proceedings of the Second International Conference on Web Search and Web Data Mining, 2009

Adapting to the Shifting Intent of Search Queries.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

2008
A Survey of Query Auditing Techniques for Data Privacy.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Privately Finding Specifications.
IEEE Trans. Software Eng., 2008

Finding Strongly Knit Clusters in Social Networks.
Internet Mathematics, 2008

2007
Clustering Social Networks.
Proceedings of the Algorithms and Models for the Web-Graph, 5th International Workshop, 2007

2006
Towards Robustness in Query Auditing.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Privacy via pseudorandom sketches.
Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2006

When Random Sampling Preserves Privacy.
Proceedings of the Advances in Cryptology, 2006

2005
Simulatable auditing.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

2004
A New Conceptual Clustering Framework.
Machine Learning, 2004

Introduction: Special Issue on Theoretical Advances in Data Clustering.
Machine Learning, 2004

Version spaces and the consistency problem.
Artif. Intell., 2004

Vision Paper: Enabling Privacy for the Paranoids.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada, August 31, 2004

On Identifying Stable Ways to Configure Systems.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

Secure Computation of the k th-Ranked Element.
Proceedings of the Advances in Cryptology, 2004

2003
Clustering Data Streams: Theory and Practice.
IEEE Trans. Knowl. Data Eng., 2003

On Finding Large Conjunctive Clusters.
Proceedings of the Computational Learning Theory and Kernel Machines, 2003

2002
Streaming-Data Algorithms for High-Quality Clustering.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

2001
Sublinear time approximate clustering.
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001

2000
Clustering Data Streams.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

1999
Efficient Read-Restricted Monotone CNF/DNF Dualization by Learning with Membership Queries.
Machine Learning, 1999

1997
Generating all Maximal Independent Sets of Bounded-Degree Hypergraphs.
Proceedings of the Tenth Annual Conference on Computational Learning Theory, 1997

Version Spaces without Boundary Sets.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Learning from a Consistently Ignorant Teacher.
J. Comput. Syst. Sci., 1996

1994
Learning from a Consistently Ignorant Teacher.
Proceedings of the Seventh Annual ACM Conference on Computational Learning Theory, 1994


  Loading...