Sciweavers

1701 search results - page 191 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2008
ACM
217views Data Mining» more  KDD 2008»
15 years 10 months ago
Stream prediction using a generative model based on frequent episodes in event sequences
This paper presents a new algorithm for sequence prediction over long categorical event streams. The input to the algorithm is a set of target event types whose occurrences we wis...
Srivatsan Laxman, Vikram Tankasali, Ryen W. White
GECCO
2007
Springer
197views Optimization» more  GECCO 2007»
15 years 4 months ago
Computational intelligence techniques: a study of scleroderma skin disease
This paper presents an analysis of microarray gene expression data from patients with and without scleroderma skin disease using computational intelligence and visual data mining ...
Julio J. Valdés, Alan J. Barton
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
15 years 7 days ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye
74
Voted
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
15 years 10 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
72
Voted
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 5 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...