Sciweavers

1290 search results - page 105 / 258
» Agent-Enriched Data Mining Using an Extendable Framework
Sort
View
KDD
2006
ACM
132views Data Mining» more  KDD 2006»
15 years 10 months ago
Utility-based anonymization using local recoding
Privacy becomes a more and more serious concern in applications involving microdata. Recently, efficient anonymization has attracted much research work. Most of the previous metho...
Jian Xu, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, B...
GFKL
2007
Springer
137views Data Mining» more  GFKL 2007»
15 years 1 months ago
Families of Dendrograms
A conceptual framework for cluster analysis from the viewpoint of p-adic geometry is introduced by describing the space of all dendrograms for n datapoints and relating it to the m...
Patrick Erik Bradley
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 4 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
BMCBI
2006
147views more  BMCBI 2006»
14 years 9 months ago
QPath: a method for querying pathways in a protein-protein interaction network
Background: Sequence comparison is one of the most prominent tools in biological research, and is instrumental in studying gene function and evolution. The rapid development of hi...
Tomer Shlomi, Daniel Segal, Eytan Ruppin, Roded Sh...
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
15 years 10 months ago
Online novelty detection on temporal sequences
: Novelty detection, or anomaly detection, on temporal sequences has increasingly attracted attention from researchers in different areas. In this paper, we present a new framework...
Junshui Ma, Simon Perkins