Sciweavers

62 search results - page 10 / 13
» Achieving k-Anonymity by Clustering in Attribute Hierarchica...
Sort
View
ICDM
2006
IEEE
152views Data Mining» more  ICDM 2006»
15 years 3 months ago
Application of Graph-based Data Mining to Metabolic Pathways
We present a method for finding biologically meaningful patterns on metabolic pathways using the SUBDUE graph-based relational learning system. A huge amount of biological data t...
Chang Hun You, Lawrence B. Holder, Diane J. Cook
ACMSE
2007
ACM
15 years 1 months ago
Verifying design modularity, hierarchy, and interaction locality using data clustering techniques
Modularity, hierarchy, and interaction locality are general approaches to reducing the complexity of any large system. A widely used principle in achieving these goals in designin...
Liguo Yu, Srini Ramaswamy
KES
2004
Springer
15 years 3 months ago
Analyzing the Temporal Sequences for Text Categorization
– This paper describes a text categorization approach that is based on a combination of a newly designed text representation with a kNN classifier. The new text document represen...
Xiao Luo, A. Nur Zincir-Heywood
IJHPCA
2008
131views more  IJHPCA 2008»
14 years 9 months ago
De Novo Ultrascale Atomistic Simulations On High-End Parallel Supercomputers
We present a de novo hierarchical simulation framework for first-principles based predictive simulations of materials and their validation on high-end parallel supercomputers and ...
Aiichiro Nakano, Rajiv K. Kalia, Ken-ichi Nomura, ...
100
Voted
SAC
2005
ACM
15 years 3 months ago
Intelligent file management in ubiquitous environments
The paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can succ...
Kartik Vishwanath, Arvind Gautam, Yugyung Lee