Sciweavers

1701 search results - page 39 / 341
» Providing k-anonymity in data mining
Sort
View
SDM
2012
SIAM
245views Data Mining» more  SDM 2012»
13 years 4 days ago
Deterministic CUR for Improved Large-Scale Data Analysis: An Empirical Study
Low-rank approximations which are computed from selected rows and columns of a given data matrix have attracted considerable attention lately. They have been proposed as an altern...
Christian Thurau, Kristian Kersting, Christian Bau...
ISCI
1998
139views more  ISCI 1998»
14 years 9 months ago
A Rough Set Approach to Attribute Generalization in Data Mining
This paper presents a method for updating approximations of a concept incrementally. The results can be used to implement a quasi-incremental algorithm for learning classification...
Chien-Chung Chan
BMCBI
2008
142views more  BMCBI 2008»
14 years 9 months ago
Microarray data mining: A novel optimization-based approach to uncover biologically coherent structures
Background: DNA microarray technology allows for the measurement of genome-wide expression patterns. Within the resultant mass of data lies the problem of analyzing and presenting...
Meng Piao Tan, Erin N. Smith, James R. Broach, Chr...
ICDM
2009
IEEE
131views Data Mining» more  ICDM 2009»
14 years 7 months ago
Unified Solution to Nonnegative Data Factorization Problems
In this paper, we restudy the non-convex data factorization problems (regularized or not, unsupervised or supervised), where the optimization is confined in the nonnegative orthan...
Xiaobai Liu, Shuicheng Yan, Jun Yan, Hai Jin
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
15 years 3 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick