Sciweavers

326 search results - page 41 / 66
» Subgroup Discovery Techniques and Applications
Sort
View
ICDM
2003
IEEE
143views Data Mining» more  ICDM 2003»
14 years 3 months ago
Active Sampling for Feature Selection
In knowledge discovery applications, where new features are to be added, an acquisition policy can help select the features to be acquired based on their relevance and the cost of...
Sriharsha Veeramachaneni, Paolo Avesani
BTW
1999
Springer
145views Database» more  BTW 1999»
14 years 2 months ago
A Multi-Tier Architecture for High-Performance Data Mining
Data mining has been recognised as an essential element of decision support, which has increasingly become a focus of the database industry. Like all computationally expensive data...
Ralf Rantzau, Holger Schwarz
SADM
2010
194views more  SADM 2010»
13 years 8 months ago
Seriation and matrix reordering methods: An historical overview
: Seriation is an exploratory combinatorial data analysis technique to reorder objects into a sequence along a one-dimensional continuum so that it best reveals regularity and patt...
Innar Liiv
ICASSP
2011
IEEE
13 years 1 months ago
Deep belief nets for natural language call-routing
This paper considers application of Deep Belief Nets (DBNs) to natural language call routing. DBNs have been successfully applied to a number of tasks, including image, audio and ...
Ruhi Sarikaya, Geoffrey E. Hinton, Bhuvana Ramabha...
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 1 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...