Sciweavers

518 search results - page 52 / 104
» Analysis of sampling techniques for association rule mining
Sort
View
MOBIDE
2010
ACM
13 years 8 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
KDD
2003
ACM
120views Data Mining» more  KDD 2003»
14 years 9 months ago
On detecting differences between groups
Understanding the differences between contrasting groups is a fundamental task in data analysis. This realization has led to the development of a new special purpose data mining t...
Geoffrey I. Webb, Shane M. Butler, Douglas A. Newl...
CEAS
2008
Springer
13 years 10 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
BMCBI
2010
131views more  BMCBI 2010»
13 years 8 months ago
A comparison of approximation techniques for variance-based sensitivity analysis of biochemical reaction systems
Background: Sensitivity analysis is an indispensable tool for the analysis of complex systems. In a recent paper, we have introduced a thermodynamically consistent variance-based ...
Hong-Xuan Zhang, John Goutsias
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic