Sciweavers

2705 search results - page 469 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KBSE
1998
IEEE
15 years 6 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green
SADM
2010
196views more  SADM 2010»
14 years 8 months ago
Bayesian adaptive nearest neighbor
: The k nearest neighbor classification (k-NN) is a very simple and popular method for classification. However, it suffers from a major drawback, it assumes constant local class po...
Ruixin Guo, Sounak Chakraborty
141
Voted
ASC
2006
15 years 1 months ago
Speeding up the learning of equivalence classes of bayesian network structures
For some time, learning Bayesian networks has been both feasible and useful in many problems domains. Recently research has been done on learning equivalence classes of Bayesian n...
Rónán Daly, Qiang Shen, J. Stuart Ai...
INFORMATICALT
2008
124views more  INFORMATICALT 2008»
15 years 1 months ago
Hierarchical Adaptive Clustering
This paper studies an adaptive clustering problem. We focus on re-clustering an object set, previously clustered, when the feature set characterizing the objects increases. We prop...
Gabriela Serban, Alina Campan
134
Voted
JMLR
2006
131views more  JMLR 2006»
15 years 1 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser