Sciweavers

1701 search results - page 201 / 341
» Providing k-anonymity in data mining
Sort
View
92
Voted
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
14 years 11 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
14 years 8 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...
ICDM
2010
IEEE
154views Data Mining» more  ICDM 2010»
14 years 8 months ago
Discrimination Aware Decision Tree Learning
Abstract--Recently, the following discrimination aware classification problem was introduced: given a labeled dataset and an attribute , find a classifier with high predictive accu...
Faisal Kamiran, Toon Calders, Mykola Pechenizkiy
CBMS
2005
IEEE
15 years 3 months ago
An Ontology-Driven Clustering Method for Supporting Gene Expression Analysis
The Gene Ontology (GO) is an important knowledge resource for biologists and bioinformaticians. This paper explores the integration of similarity information derived from GO into ...
Haiying Wang, Francisco Azuaje, Olivier Bodenreide...
97
Voted
DMIN
2006
120views Data Mining» more  DMIN 2006»
14 years 11 months ago
Time Series as a Point - A Novel Approach for Time Series Cluster Visualization
: Temporal data mining is concerned with the analysis of temporal data and finding temporal patterns, regularities, trends, clusters in sets of temporal data. Wavelet transform pro...
R. Pradeep Kumar, P. Nagabhushan