Sciweavers

831 search results - page 80 / 167
» Finding Minimum Data Requirements Using Pseudo-independence
Sort
View
KES
2005
Springer
14 years 3 months ago
A SVM Regression Based Approach to Filling in Missing Values
In KDD procedure, to fill in missing data typically requires a very large investment of time and energy - often 80% to 90% of a data analysis project is spent in making the data re...
Honghai Feng, Chen Guoshun, Yin Cheng, Bingru Yang...
PAKDD
1999
ACM
113views Data Mining» more  PAKDD 1999»
14 years 2 months ago
Characterization of Default Knowledge in Ripple Down Rules Method
Abstract. \Ripple Down Rules (RDR)" Method is one of the promising approaches to directly acquire and encode knowledge from human experts. It requires data to be supplied incr...
Takuya Wada, Tadashi Horiuchi, Hiroshi Motoda, Tak...
BMCBI
2010
133views more  BMCBI 2010»
13 years 10 months ago
Improving de novo sequence assembly using machine learning and comparative genomics for overlap correction
Background: With the rapid expansion of DNA sequencing databases, it is now feasible to identify relevant information from prior sequencing projects and completed genomes and appl...
Lance E. Palmer, Mathäus Dejori, Randall A. B...
MOBIHOC
2008
ACM
14 years 10 months ago
Routing performance analysis of human-driven delay tolerant networks using the truncated levy walk model
The routing performance of delay tolerant networks (DTN) is highly correlated with the distribution of inter-contact times (ICT), the time period between two successive contacts o...
Seongik Hong, Injong Rhee, Seong Joon Kim, Kyungha...
CIKM
2009
Springer
14 years 4 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...