Sciweavers

1013 search results - page 101 / 203
» Comparisons Between Data Clustering Algorithms
Sort
View
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
ICCS
2004
Springer
14 years 2 months ago
Developing a Data Driven System for Computational Neuroscience
Abstract. A data driven system implies the need to integrate data acquisition and signal processing into the same system that will interact with this information. This can be done ...
Ross Snider, Yongming Zhu
BIBE
2003
IEEE
116views Bioinformatics» more  BIBE 2003»
14 years 2 months ago
An Assessment of a Metric Space Database Index to Support Sequence Homology
Hierarchical metric-space clustering methods have been commonly used to organize proteomes into taxonomies. Consequently, it is often anticipated that hierarchical clustering can ...
Rui Mao, Weijia Xu, Neha Singh, Daniel P. Miranker
JMIV
2011
179views more  JMIV 2011»
13 years 4 months ago
3-D Data Denoising and Inpainting with the Low-Redundancy Fast Curvelet Transform
In this paper, we first present a new implementation of the 3-D fast curvelet transform, which is nearly 2.5 less redundant than the Curvelab (wrapping-based) implementation as o...
A. Woiselle, Jean-Luc Starck, Jalal Fadili
DSN
2009
IEEE
14 years 3 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion