Sciweavers

1749 search results - page 211 / 350
» An ICA algorithm for analyzing multiple data sets
Sort
View
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
14 years 5 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
ICPP
2009
IEEE
14 years 2 months ago
Generalizing k-Betweenness Centrality Using Short Paths and a Parallel Multithreaded Implementation
We present a new parallel algorithm that extends and generalizes the traditional graph analysis metric of betweenness centrality to include additional non-shortest paths according...
Karl Jiang, David Ediger, David A. Bader
BMCBI
2007
145views more  BMCBI 2007»
13 years 8 months ago
Improved benchmarks for computational motif discovery
Background: An important step in annotation of sequenced genomes is the identification of transcription factor binding sites. More than a hundred different computational methods h...
Geir Kjetil Sandve, Osman Abul, Vegard Walseng, Fi...
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
14 years 4 days ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
ISBI
2007
IEEE
14 years 2 months ago
Lesion Detection in Noisy Mr Brain Images Using Constrained Gmm and Active Contours
This paper focuses on the detection and segmentation of multiple sclerosis (MS) lesions in magnetic resonance images. The proposed method performs healthy tissue segmentation usin...
Oren Freifeld, Hayit Greenspan, Jacob Goldberger