Sciweavers

1701 search results - page 210 / 341
» Providing k-anonymity in data mining
Sort
View
ICDM
2008
IEEE
160views Data Mining» more  ICDM 2008»
15 years 4 months ago
Direct Zero-Norm Optimization for Feature Selection
Zero-norm, defined as the number of non-zero elements in a vector, is an ideal quantity for feature selection. However, minimization of zero-norm is generally regarded as a combi...
Kaizhu Huang, Irwin King, Michael R. Lyu
SISAP
2008
IEEE
175views Data Mining» more  SISAP 2008»
15 years 4 months ago
Anytime K-Nearest Neighbor Search for Database Applications
Many contemporary database applications require similarity-based retrieval of complex objects where the only usable knowledge of its domain is determined by a metric distance func...
Weijia Xu, Daniel P. Miranker, Rui Mao, Smriti R. ...
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
15 years 4 months ago
A Support Vector Approach to Censored Targets
Censored targets, such as the time to events in survival analysis, can generally be represented by intervals on the real line. In this paper, we propose a novel support vector tec...
Pannagadatta K. Shivaswamy, Wei Chu, Martin Jansch...
ICDM
2007
IEEE
129views Data Mining» more  ICDM 2007»
15 years 4 months ago
A Generalization of Proximity Functions for K-Means
K-means is a widely used partitional clustering method. A large amount of effort has been made on finding better proximity (distance) functions for K-means. However, the common c...
Junjie Wu, Hui Xiong, Jian Chen, Wenjun Zhou
ICDM
2007
IEEE
187views Data Mining» more  ICDM 2007»
15 years 4 months ago
A Comparative Study of Methods for Transductive Transfer Learning
The problem of transfer learning, where information gained in one learning task is used to improve performance in another related task, is an important new area of research. While...
Andrew Arnold, Ramesh Nallapati, William W. Cohen