Sciweavers

879 search results - page 112 / 176
» Greedy Attribute Selection
Sort
View
WICSA
2004
13 years 11 months ago
Mining Patterns to Support Software Architecture Evaluation
In this paper, we present an approach to improve the software architecture evaluation process by systematically extracting and appropriately documenting architecturally significan...
Liming Zhu, Muhammad Ali Babar, D. Ross Jeffery
DATAMINE
2006
139views more  DATAMINE 2006»
13 years 10 months ago
VizRank: Data Visualization Guided by Machine Learning
Data visualization plays a crucial role in identifying interesting patterns in exploratory data analysis. Its use is, however, made difficult by the large number of possible data p...
Gregor Leban, Blaz Zupan, Gaj Vidmar, Ivan Bratko
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 10 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
ESWA
2008
134views more  ESWA 2008»
13 years 8 months ago
Neighborhood classifiers
K nearest neighbor classifier (K-NN) is widely discussed and applied in pattern recognition and machine learning, however, as a similar lazy classifier using local information for...
Qinghua Hu, Daren Yu, Zongxia Xie
INFORMATICALT
2010
92views more  INFORMATICALT 2010»
13 years 8 months ago
New Fuzzy Identity-Based Encryption in the Standard Model
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang