Sciweavers

4429 search results - page 140 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
134
Voted
COMPSAC
2008
IEEE
15 years 6 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
160
Voted
DEXAW
1999
IEEE
97views Database» more  DEXAW 1999»
15 years 9 months ago
Mining Several Data Bases with an Ensemble of Classifiers
The results of knowledge discovery in databases could vary depending on the data mining method. There are several ways to select the most appropriate data mining method dynamicall...
Seppo Puuronen, Vagan Y. Terziyan, Alexander Logvi...
FSMNLP
2005
Springer
15 years 10 months ago
Algorithms for Minimum Risk Chunking
Abstract. Stochastic finite automata are useful for identifying substrings (chunks) within larger units of text. Relevant applications include tokenization, base-NP chunking, name...
Martin Jansche
153
Voted
ITCC
2005
IEEE
15 years 10 months ago
Analyzing Relations among Software Patterns based on Document Similarity
In software development, many kinds of knowledge are shared and reused as software patterns. Howevel; the relation analysis among software by hand is on the large scale. In this w...
Atsuto Kubo, Hironori Washizaki, Atsuhiro Takasu, ...