Sciweavers

1640 search results - page 227 / 328
» Deriving Private Information from Randomized Data
Sort
View
142
Voted
BDA
2007
15 years 5 months ago
Query Rewriting Based on User's Profile Knowledge
Query personalization was introduced as an advanced mechanism to allow the reformulation of database queries and adapt them to the user's domain of interest and preferences. ...
Dimitre Kostadinov, Mokrane Bouzeghoub, Sté...
181
Voted
BMCBI
2011
14 years 10 months ago
Using Stochastic Causal Trees to Augment Bayesian Networks for Modeling eQTL Datasets
Background: The combination of genotypic and genome-wide expression data arising from segregating populations offers an unprecedented opportunity to model and dissect complex phen...
Kyle C. Chipman, Ambuj K. Singh
150
Voted
AIPR
2007
IEEE
15 years 10 months ago
3D Scene Reconstruction through a Fusion of Passive Video and Lidar Imagery
Geometric structure of a scene can be reconstructed using many methods. In recent years, two prominent approaches have been digital photogrammetric analysis using passive stereo i...
Prudhvi Gurram, Stephen Lach, Eli Saber, Harvey E....
152
Voted
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
16 years 4 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...
139
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 4 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé