Sciweavers

1701 search results - page 208 / 341
» Providing k-anonymity in data mining
Sort
View
BMCBI
2005
87views more  BMCBI 2005»
14 years 10 months ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 3 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...
KDD
2003
ACM
99views Data Mining» more  KDD 2003»
15 years 10 months ago
Fragments of order
High-dimensional collections of 0-1 data occur in many applications. The attributes in such data sets are typically considered to be unordered. However, in many cases there is a n...
Aristides Gionis, Teija Kujala, Heikki Mannila
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
15 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
BMCBI
2011
14 years 1 months ago
To aggregate or not to aggregate high-dimensional classifiers
Background: High-throughput functional genomics technologies generate large amount of data with hundreds or thousands of measurements per sample. The number of sample is usually m...
Cheng-Jian Xu, Huub C. J. Hoefsloot, Age K. Smilde