Sciweavers

1701 search results - page 269 / 341
» Providing k-anonymity in data mining
Sort
View
ICML
2006
IEEE
14 years 10 months ago
Robust probabilistic projections
Principal components and canonical correlations are at the root of many exploratory data mining techniques and provide standard pre-processing tools in machine learning. Lately, p...
Cédric Archambeau, Michel Verleysen, Nicola...
SDM
2009
SIAM
104views Data Mining» more  SDM 2009»
14 years 7 months ago
On Randomness Measures for Social Networks.
Social networks tend to contain some amount of randomness and some amount of non-randomness. The amount of randomness versus non-randomness affects the properties of a social netw...
Xiaowei Ying, Xintao Wu
ISIP
2008
IEEE
14 years 4 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford
SACI
2007
IEEE
14 years 4 months ago
A Computational Intelligence Approach for Ranking Risk Factors in Preterm Birth
- The aim of this paper is to propose a filter, based on a multi-objective evolutionary algorithm, for attributes’ ranking in the context of a data mining task. The behavior of t...
Daniela Zaharie, Stefan Holban, Diana Lungeanu, Da...
WEBI
2007
Springer
14 years 4 months ago
Layers and Hierarchies in Real Virtual Networks
The virtual world is comprised of data items related to each other in a variety of contexts. Often such relations can be represented as graphs that evolve over time. Examples incl...
Olga Goussevskaia, Michael Kuhn 0002, Roger Watten...