Sciweavers

2049 search results - page 215 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
EDM
2010
154views Data Mining» more  EDM 2010»
14 years 10 months ago
Can We Get Better Assessment From A Tutoring System Compared to Traditional Paper Testing? Can We Have Our Cake (Better Assessme
Dynamic assessment (DA) has been advocated as an interactive approach to conduct assessments to students in the learning systems as it can differentiate student proficiency at a fi...
Mingyu Feng, Neil T. Heffernan
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
16 years 3 days ago
Cut-and-stitch: efficient parallel learning of linear dynamical systems on smps
Multi-core processors with ever increasing number of cores per chip are becoming prevalent in modern parallel computing. Our goal is to make use of the multi-core as well as multi...
Lei Li, Wenjie Fu, Fan Guo, Todd C. Mowry, Christo...
KDD
1997
ACM
154views Data Mining» more  KDD 1997»
15 years 3 months ago
Autonomous Discovery of Reliable Exception Rules
This paper presents an autonomous algorithm for discovering exception rules from data sets. An exception rule, which is defined as a deviational pattern to a well-known fact, exhi...
Einoshin Suzuki
103
Voted
ECAGENTS
2001
Springer
127views ECommerce» more  ECAGENTS 2001»
15 years 4 months ago
User-Centered Agents for Structured Information Location
Abstract. This paper designs an electronic commerce system that integrates conventional electronic commerce services with contemporary WWW advantages, such as comprehensive coverag...
Xindong Wu, Daniel Ngu, Sameer Pradhan
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
15 years 3 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger