Sciweavers

96 search results - page 2 / 20
» Efficient Algorithmic Techniques for Several Multidimensiona...
Sort
View
92
Voted
KDD
2010
ACM
223views Data Mining» more  KDD 2010»
15 years 5 months ago
An efficient algorithm for a class of fused lasso problems
The fused Lasso penalty enforces sparsity in both the coefficients and their successive differences, which is desirable for applications with features ordered in some meaningful w...
Jun Liu, Lei Yuan, Jieping Ye
135
Voted
FTML
2010
159views more  FTML 2010»
15 years 2 months ago
Dimension Reduction: A Guided Tour
We give a tutorial overview of several geometric methods for dimension reduction. We divide the methods into projective methods and methods that model the manifold on which the da...
Christopher J. C. Burges
135
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 9 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
15 years 10 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...
139
Voted
VLDB
2007
ACM
96views Database» more  VLDB 2007»
15 years 9 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...