Sciweavers

7623 search results - page 1336 / 1525
» Constructive Volume Modeling
Sort
View
141
Voted
SDM
2007
SIAM
118views Data Mining» more  SDM 2007»
15 years 5 months ago
On Privacy-Preservation of Text and Sparse Binary Data with Sketches
In recent years, privacy preserving data mining has become very important because of the proliferation of large amounts of data on the internet. Many data sets are inherently high...
Charu C. Aggarwal, Philip S. Yu
137
Voted
SDM
2007
SIAM
162views Data Mining» more  SDM 2007»
15 years 5 months ago
Probabilistic Joint Feature Selection for Multi-task Learning
We study the joint feature selection problem when learning multiple related classification or regression tasks. By imposing an automatic relevance determination prior on the hypo...
Tao Xiong, Jinbo Bi, R. Bharat Rao, Vladimir Cherk...
138
Voted
AAAI
2004
15 years 5 months ago
Branching Storylines in Virtual Reality Environments for Leadership Development
Simulation-based training is increasingly being used within the military to practice and develop the skills of successful soldiers. For the skills associated with successful milit...
Andrew Gordon, Michael van Lent, Martin Van Velsen...
106
Voted
AIPS
2006
15 years 5 months ago
Optimal Rectangle Packing: A Meta-CSP Approach
We present a new approach to optimal rectangle packing, an NP-complete problem that can be used to model many simple scheduling tasks. Recent attempts at incorporating artificial ...
Michael D. Moffitt, Martha E. Pollack
144
Voted
CSREASAM
2006
15 years 5 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
« Prev « First page 1336 / 1525 Last » Next »