Sciweavers

627 search results - page 45 / 126
» Privacy-Preserving k-NN for Small and Large Data Sets
Sort
View
TIT
1998
80views more  TIT 1998»
14 years 11 months ago
Structural Risk Minimization Over Data-Dependent Hierarchies
The paper introduces some generalizations of Vapnik’s method of structural risk minimisation (SRM). As well as making explicit some of the details on SRM, it provides a result t...
John Shawe-Taylor, Peter L. Bartlett, Robert C. Wi...
COLING
2010
14 years 6 months ago
Exploring the Data-Driven Prediction of Prepositions in English
Prepositions in English are a well-known challenge for language learners, and the computational analysis of preposition usage has attracted significant attention. Such research ge...
Anas Elghafari, Detmar Meurers, Holger Wunsch
ISBRA
2007
Springer
15 years 5 months ago
Noise-Based Feature Perturbation as a Selection Method for Microarray Data
Abstract. DNA microarrays can monitor the expression levels of thousands of genes simultaneously, providing the opportunity for the identification of genes that are differentiall...
Li Chen, Dmitry B. Goldgof, Lawrence O. Hall, Stev...
RECOMB
2006
Springer
15 years 11 months ago
Efficient Enumeration of Phylogenetically Informative Substrings
We study the problem of enumerating substrings that are common amongst genomes that share evolutionary descent. For example, one might want to enumerate all identical (therefore co...
Stanislav Angelov, Boulos Harb, Sampath Kannan, Sa...
77
Voted
ICPR
2008
IEEE
15 years 5 months ago
Incremental clustering via nonnegative matrix factorization
Nonnegative matrix factorization (NMF) has been shown to be an efficient clustering tool. However, NMF`s batch nature necessitates recomputation of whole basis set for new samples...
Serhat Selcuk Bucak, Bilge Günsel