Sciweavers

511 search results - page 82 / 103
» Mining Inheritance Rules from Genealogical Data
Sort
View
KDD
1999
ACM
217views Data Mining» more  KDD 1999»
15 years 4 months ago
An Efficient Algorithm to Update Large Itemsets with Early Pruning
We present an efficient algorithm (UWEP) for updating large itemsets when new transactions are added to the set of old transactions. UWEP employs a dynamic lookahead strategy in u...
Necip Fazil Ayan, Abdullah Uz Tansel, M. Erol Arku...
TNN
1998
121views more  TNN 1998»
14 years 11 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
DMIN
2009
195views Data Mining» more  DMIN 2009»
14 years 9 months ago
Improved k-NN Algorithm for Text Classification
- Over the last twenty years, text classification has become one of the key techniques for organizing electronic information such as text and web documents. The k-Nearest Neighbor ...
Muhammed Miah
VDA
2010
206views Visualization» more  VDA 2010»
15 years 2 months ago
Visual discovery in multivariate binary data
This paper presents the concept of Monotone Boolean Function Visual Analytics (MBFVA) and its application to the medical domain. The medical application is concerned with discover...
Boris Kovalerchuk, Florian Delizy, Logan Riggs, Ev...
DSS
2007
226views more  DSS 2007»
14 years 11 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri