We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
— The purpose of this paper is to model the stochastic behavior of nodal prices and use the predicted price differences between zones as the basis for measuring the magnitude and...
Abstract- The large majority of existing clustering algorithms are centered around the notion of a feature, that is, individual data items are represented by their intrinsic proper...
Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) techniques are important and well-developed area of image recognition and to date many linear discriminati...