Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
We describe an application of AI search and information visualization techniques to the problem of school redistricting, in which students are assigned to home schools within a co...
Marie desJardins, Blazej Bulka, Ryan Carr, Andrew ...
Diffusion tensor fields reveal the underlying anatomical structures in biological tissues such as neural fibers in the brain. Most current methods for visualizing the diffusion te...
Wei Chen, Song Zhang, Stephen Correia, David F. Ta...
With the explosive growth of proteomic and expression data of homologous genes, it becomes necessary to explore new methods to visualize and analyze related gene expression data t...
Li Jin, Karl V. Steiner, Carl J. Schmidt, Keith...
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...