Sciweavers

7163 search results - page 1231 / 1433
» Privacy-Preserving Data Mining
Sort
View
SAC
2011
ACM
14 years 6 months ago
A quasi-Newton acceleration for high-dimensional optimization algorithms
Abstract In many statistical problems, maximum likelihood estimation by an EM or MM algorithm suffers from excruciatingly slow convergence. This tendency limits the application of ...
Hua Zhou, David Alexander, Kenneth Lange
JMLR
2010
120views more  JMLR 2010»
14 years 5 months ago
Effective Wrapper-Filter hybridization through GRASP Schemata
Of all of the challenges which face the selection of relevant features for predictive data mining or pattern recognition modeling, the adaptation of computational intelligence tec...
Mohamed Amir Esseghir
JMMA
2010
162views more  JMMA 2010»
14 years 5 months ago
Co-clustering Documents and Words by Minimizing the Normalized Cut Objective Function
This paper follows a word-document co-clustering model independently introduced in 2001 by several authors such as I.S. Dhillon, H. Zha and C. Ding. This model consists in creatin...
Charles-Edmond Bichot
102
Voted
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 2 months ago
Heuristic Algorithm for Interpretation of Non-Atomic Categorical Attributes in Similarity-based Fuzzy Databases - Scalability Ev
- In this work we are analyzing scalability of the heuristic algorithm we used in the past [1-4] to discover knowledge from multi-valued symbolic attributes in fuzzy databases. The...
M. Shahriar Hossain, Rafal A. Angryk
ICASSP
2011
IEEE
14 years 2 months ago
Towards robust word discovery by self-similarity matrix comparison
Word discovery is the task of discovering and collecting occurrences of repeating words in the absence of prior acoustic and linguistic knowledge, or training material. The capabi...
Armando Muscariello, Guillaume Gravier, Fré...
« Prev « First page 1231 / 1433 Last » Next »