Sciweavers

503 search results - page 89 / 101
» Output privacy in data mining
Sort
View
CCECE
2011
IEEE
13 years 9 months ago
Towards a portable, memory-efficient test system for Conducted Energy Weapons
We present a readily portable, memory-efficient performance test system (PTS) for Tasers. The proposed PTS has been developped for the most widely used Conducted Energy Weapons (...
Peyman Rahmati, David Dawson, Andy Adler
GRC
2007
IEEE
15 years 4 months ago
Perceptual Reasoning: A New Computing with Words Engine
— Zadeh proposed the paradigm of computing with words (CWW). We have proposed a CWW architecture for making subjective judgments, called a Perceptual Computer (PerC). Because wor...
Jerry M. Mendel, Dongrui Wu
FCT
2001
Springer
15 years 2 months ago
Polynomial Time Algorithms for Finding Unordered Tree Patterns with Internal Variables
Many documents such as Web documents or XML files have tree structures. A term tree is an unordered tree pattern consisting of internal variables and tree structures. In order to ...
Takayoshi Shoudai, Tomoyuki Uchida, Tetsuhiro Miya...
CIKM
2010
Springer
14 years 8 months ago
FacetCube: a framework of incorporating prior knowledge into non-negative tensor factorization
Non-negative tensor factorization (NTF) is a relatively new technique that has been successfully used to extract significant characteristics from polyadic data, such as data in s...
Yun Chi, Shenghuo Zhu
GRC
2010
IEEE
14 years 11 months ago
Learning Multiple Latent Variables with Self-Organizing Maps
Inference of latent variables from complicated data is one important problem in data mining. The high dimensionality and high complexity of real world data often make accurate infe...
Lili Zhang, Erzsébet Merényi