Sciweavers

1998 search results - page 339 / 400
» Basic Association Rules
Sort
View
DKE
2008
159views more  DKE 2008»
13 years 8 months ago
Isolated items discarding strategy for discovering high utility itemsets
Traditional methods of association rule mining consider the appearance of an item in a transaction, whether or not it is purchased, as a binary variable. However, customers may pu...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
BIOINFORMATICS
2006
124views more  BIOINFORMATICS 2006»
13 years 8 months ago
Helix Interaction Tool (HIT): a web-based tool for analysis of helix-helix interactions in proteins
Motivation: In many proteins, helix-helix interactions can be critical to establishing protein conformation (folding) and dynamics, as well as determining associations between pro...
Anne E. Counterman Burba, Ursula Lehnert, Eric Z. ...
IJSI
2008
122views more  IJSI 2008»
13 years 8 months ago
Mining Gene Expression Data using Domain Knowledge
Biology is now an information-intensive science and various research areas, like molecular biology, evolutionary biology or environmental biology, heavily depend on the availabilit...
Nicolas Pasquier, Claude Pasquier, Laurent Brisson...
IJDAR
2006
102views more  IJDAR 2006»
13 years 8 months ago
Table form document analysis based on the document structure grammar
Structure analysis of table form documents is an important issue because a printed document and even an electronic document do not provide logical structural information but merely...
Akira Amano, Naoki Asada, Masayuki Mukunoki, Masah...
JCS
2008
93views more  JCS 2008»
13 years 8 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...