Sciweavers

177 search results - page 34 / 36
» Using randomized response techniques for privacy-preserving ...
Sort
View
SADM
2010
128views more  SADM 2010»
14 years 8 months ago
Online training on a budget of support vector machines using twin prototypes
: This paper proposes twin prototype support vector machine (TVM), a constant space and sublinear time support vector machine (SVM) algorithm for online learning. TVM achieves its ...
Zhuang Wang, Slobodan Vucetic
SDM
2009
SIAM
175views Data Mining» more  SDM 2009»
15 years 6 months ago
Low-Entropy Set Selection.
Most pattern discovery algorithms easily generate very large numbers of patterns, making the results impossible to understand and hard to use. Recently, the problem of instead sel...
Hannes Heikinheimo, Jilles Vreeken, Arno Siebes, H...
BMCBI
2011
14 years 1 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
SIGMETRICS
2008
ACM
131views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
On the design of hybrid peer-to-peer systems
In this paper, we consider hybrid peer-to-peer systems where users form an unstructured peer-to-peer network with the purpose of assisting a server in the distribution of data. We...
Stratis Ioannidis, Peter Marbach
82
Voted
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 10 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...