Sciweavers

7715 search results - page 1315 / 1543
» Visual Rules Modeling
Sort
View
130
Voted
AAAI
2007
15 years 5 months ago
A Randomized String Kernel and Its Application to RNA Interference
String kernels directly model sequence similarities without the necessity of extracting numerical features in a vector space. Since they better capture complex traits in the seque...
Shibin Qiu, Terran Lane, Ljubomir J. Buturovic
ACSC
2008
IEEE
15 years 5 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
BIRTHDAY
2008
Springer
15 years 5 months ago
AND/OR Multi-valued Decision Diagrams for Constraint Networks
The paper is an overview of a recently developed compilation data structure for graphical models, with specific application to constraint networks. The AND/OR Multi-Valued Decision...
Robert Mateescu, Rina Dechter
119
Voted
BIRTHDAY
2008
Springer
15 years 5 months ago
From Domain to Requirements
This is a discursive paper. That is, it shows some formulas (but only as examples so that the reader may be convinced that there is, perhaps, some substance to our claims), no theo...
Dines Bjørner
112
Voted
DEXA
2008
Springer
123views Database» more  DEXA 2008»
15 years 5 months ago
Emerging Pattern Based Classification in Relational Data Mining
The usage of descriptive data mining methods for predictive purposes is a recent trend in data mining research. It is well motivated by the understandability of learned models, the...
Michelangelo Ceci, Annalisa Appice, Donato Malerba
« Prev « First page 1315 / 1543 Last » Next »