Sciweavers

1025 search results - page 74 / 205
» Constraint Programming for Data Mining and Machine Learning
Sort
View
IICAI
2003
15 years 4 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
PLDI
2003
ACM
15 years 8 months ago
Meta optimization: improving compiler heuristics with machine learning
Compiler writers have crafted many heuristics over the years to approximately solve NP-hard problems efficiently. Finding a heuristic that performs well on a broad range of applic...
Mark Stephenson, Saman P. Amarasinghe, Martin C. M...
ICDM
2009
IEEE
200views Data Mining» more  ICDM 2009»
15 years 23 days ago
Improving SVM Classification on Imbalanced Data Sets in Distance Spaces
Abstract--Imbalanced data sets present a particular challenge to the data mining community. Often, it is the rare event that is of interest and the cost of misclassifying the rare ...
Suzan Koknar-Tezel, Longin Jan Latecki
ICDM
2009
IEEE
198views Data Mining» more  ICDM 2009»
15 years 9 months ago
Information Extraction for Clinical Data Mining: A Mammography Case Study
Abstract—Breast cancer is the leading cause of cancer mortality in women between the ages of 15 and 54. During mammography screening, radiologists use a strict lexicon (BI-RADS) ...
Houssam Nassif, Ryan Woods, Elizabeth S. Burnside,...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 4 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny