Sciweavers

7163 search results - page 1275 / 1433
» Privacy-Preserving Data Mining
Sort
View
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
15 years 5 months ago
Rule Ensembles for Multi-target Regression
—Methods for learning decision rules are being successfully applied to many problem domains, especially where understanding and interpretation of the learned model is necessary. ...
Timo Aho, Bernard Zenko, Saso Dzeroski
ICDM
2009
IEEE
233views Data Mining» more  ICDM 2009»
15 years 5 months ago
Semi-Supervised Sequence Labeling with Self-Learned Features
—Typical information extraction (IE) systems can be seen as tasks assigning labels to words in a natural language sequence. The performance is restricted by the availability of l...
Yanjun Qi, Pavel Kuksa, Ronan Collobert, Kunihiko ...
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
15 years 5 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
15 years 5 months ago
Iterative Set Expansion of Named Entities Using the Web
Set expansion refers to expanding a partial set of “seed” objects into a more complete set. One system that does set expansion is SEAL (Set Expander for Any Language), which e...
Richard C. Wang, William W. Cohen
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
15 years 5 months ago
Quantitative Association Analysis Using Tree Hierarchies
Association analysis arises in many important applications such as bioinformatics and business intelligence. Given a large collection of measurements over a set of samples, associ...
Feng Pan, Lynda Yang, Leonard McMillan, Fernando P...
« Prev « First page 1275 / 1433 Last » Next »