Sciweavers

568 search results - page 80 / 114
» Efficient Distribution Mining and Classification
Sort
View
237
Voted
BMCBI
2008
150views more  BMCBI 2008»
15 years 3 months ago
BibGlimpse: The case for a light-weight reprint manager in distributed literature research
Background: While text-mining and distributed annotation systems both aim at capturing knowledge and presenting it in a standardized form, there have been few attempts to investig...
Thomas Tüchler, Golda Velez, Alexandra Graf, ...
TEC
2010
173views more  TEC 2010»
14 years 10 months ago
Analysis of Computational Time of Simple Estimation of Distribution Algorithms
Estimation of distribution algorithms (EDAs) are widely used in stochastic optimization. Impressive experimental results have been reported in the literature. However, little work ...
Tianshi Chen, Ke Tang, Guoliang Chen, Xin Yao
142
Voted
IJAC
2000
104views more  IJAC 2000»
15 years 3 months ago
Construction of Self-Distributive Operations and Charged Braids
Starting from a certain monoid that describes the geometry of the left self-distributivity identity, we construct an explicit realization of the free left self-distributive system ...
Patrick Dehornoy
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 3 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 9 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...