Sciweavers

3651 search results - page 598 / 731
» Data Mining for Security Applications
Sort
View
97
Voted
WSDM
2012
ACM
259views Data Mining» more  WSDM 2012»
13 years 6 months ago
Learning recommender systems with adaptive regularization
Many factorization models like matrix or tensor factorization have been proposed for the important application of recommender systems. The success of such factorization models dep...
Steffen Rendle
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 1 months ago
Fast bregman divergence NMF using taylor expansion and coordinate descent
Non-negative matrix factorization (NMF) provides a lower rank approximation of a matrix. Due to nonnegativity imposed on the factors, it gives a latent structure that is often mor...
Liangda Li, Guy Lebanon, Haesun Park
AIIA
2005
Springer
15 years 4 months ago
Towards Fault-Tolerant Formal Concept Analysis
Given Boolean data sets which record properties of objects, Formal Concept Analysis is a well-known approach for knowledge discovery. Recent application domains, e.g., for very lar...
Ruggero G. Pensa, Jean-François Boulicaut
112
Voted
NAR
2011
307views Computer Vision» more  NAR 2011»
14 years 6 months ago
BRENDA, the enzyme information system in 2011
The BRENDA (BRaunschweig ENzyme Database, http://www.brenda-enzymes.org) enzyme information system is the main collection of enzyme functional and property data for the scientific...
Maurice Scheer, Andreas Grote, Antje Chang, Ida Sc...
JMLR
2010
119views more  JMLR 2010»
14 years 6 months ago
The Coding Divergence for Measuring the Complexity of Separating Two Sets
In this paper we integrate two essential processes, discretization of continuous data and learning of a model that explains them, towards fully computational machine learning from...
Mahito Sugiyama, Akihiro Yamamoto