Sciweavers

1035 search results - page 72 / 207
» Cluster validation using information stability measures
Sort
View
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 4 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
BMCBI
2006
116views more  BMCBI 2006»
14 years 10 months ago
Cluster analysis for DNA methylation profiles having a detection threshold
Background: DNA methylation, a molecular feature used to investigate tumor heterogeneity, can be measured on many genomic regions using the MethyLight technology. Due to the combi...
Paul Marjoram, Jing Chang, Peter W. Laird, Kimberl...
MOBISYS
2011
ACM
14 years 20 days ago
AccuLoc: practical localization of performance measurements in 3G networks
Operators of 3G data networks need to distinguish the performance of each geographic area in their 3G networks to detect and resolve local network problems. This is because the qu...
Qiang Xu, Alexandre Gerber, Zhuoqing Morley Mao, J...
BMCBI
2010
134views more  BMCBI 2010»
14 years 10 months ago
ScreenMill: A freely available software suite for growth measurement, analysis and visualization of high-throughput screen data
Background: Many high-throughput genomic experiments, such as Synthetic Genetic Array and yeast two-hybrid, use colony growth on solid media as a screen metric. These experiments ...
John C. Dittmar, Robert J. D. Reid, Rodney Rothste...
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
14 years 7 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa