Sciweavers

1298 search results - page 37 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
223
Voted
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 3 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
DGO
2008
126views Education» more  DGO 2008»
15 years 3 months ago
Active learning for e-rulemaking: public comment categorization
We address the e-rulemaking problem of reducing the manual labor required to analyze public comment sets. In current and previous work, for example, text categorization techniques...
Stephen Purpura, Claire Cardie, Jesse Simons
GECCO
2004
Springer
127views Optimization» more  GECCO 2004»
15 years 7 months ago
Improved Niching and Encoding Strategies for Clustering Noisy Data Sets
Clustering is crucial to many applications in pattern recognition, data mining, and machine learning. Evolutionary techniques have been used with success in clustering, but most su...
Olfa Nasraoui, Elizabeth Leon
KDD
1999
ACM
206views Data Mining» more  KDD 1999»
15 years 6 months ago
Compressed Data Cubes for OLAP Aggregate Query Approximation on Continuous Dimensions
Efficiently answering decision support queries is an important problem. Most of the work in this direction has been in the context of the data cube. Queries are efficiently answer...
Jayavel Shanmugasundaram, Usama M. Fayyad, Paul S....
JMLR
2010
230views more  JMLR 2010»
14 years 8 months ago
Learning Dissimilarities for Categorical Symbols
In this paper we learn a dissimilarity measure for categorical data, for effective classification of the data points. Each categorical feature (with values taken from a finite set...
Jierui Xie, Boleslaw K. Szymanski, Mohammed J. Zak...