Sciweavers

627 search results - page 57 / 126
» Privacy-Preserving k-NN for Small and Large Data Sets
Sort
View
CHI
2009
ACM
15 years 12 months ago
Finding canonical behaviors in user protocols
While the collection of behavioral protocols has been common practice in human-computer interaction research for many years, the analysis of large protocol data sets is often extr...
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
KDD
2005
ACM
205views Data Mining» more  KDD 2005»
15 years 4 months ago
Feature bagging for outlier detection
Outlier detection has recently become an important problem in many industrial and financial applications. In this paper, a novel feature bagging approach for detecting outliers in...
Aleksandar Lazarevic, Vipin Kumar
DILS
2008
Springer
15 years 1 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
DIS
2004
Springer
15 years 4 months ago
Tiling Databases
Abstract. In this paper, we consider 0/1 databases and provide an alternative way of extracting knowledge from such databases using tiles. A tile is a region in the database consis...
Floris Geerts, Bart Goethals, Taneli Mielikäi...
RECOMB
2005
Springer
15 years 11 months ago
A Partial Solution to the C-Value Paradox
In the half-century since the C-value paradox (the apparent lack of correlation between organismal genome size and morphological complexity) was described, there have been no expli...
Jeffrey M. Marcus