Sciweavers

2386 search results - page 473 / 478
» Database Security 2000
Sort
View
JELIA
2000
Springer
14 years 1 months ago
An Algorithmic Approach to Recover Inconsistent Knowledge-Bases
Abstract. We consider an algorithmic approach for revising inconsistent data and restoring its consistency. This approach detects the\spoiled" part of the data (i.e., the set ...
Ofer Arieli
KDD
2000
ACM
129views Data Mining» more  KDD 2000»
14 years 1 months ago
Evolutionary algorithms in data mining: multi-objective performance modeling for direct marketing
Predictive models in direct marketing seek to identify individuals most likely to respond to promotional solicitations or other intervention programs. While standard modeling appr...
Siddhartha Bhattacharyya
KDD
2000
ACM
140views Data Mining» more  KDD 2000»
14 years 1 months ago
Effective Retrieval of Audio Information from Annotated Text Using Ontologies
To improve the accuracy in terms of precision and recall of an audio information retrieval system we have created a domainspecific ontology (a collection of key concepts and their...
Latifur Khan, Dennis McLeod
MICAI
2000
Springer
14 years 1 months ago
Eigenfaces Versus Eigeneyes: First Steps Toward Performance Assessment of Representations for Face Recognition
The Principal Components Analysis (PCA) is one of the most successfull techniques that have been used to recognize faces in images. This technique consists of extracting the eigenv...
Teófilo Emídio de Campos, Rogé...
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
14 years 1 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu