Sciweavers

331 search results - page 38 / 67
» Vicinal Risk Minimization
Sort
View
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 2 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
ICDM
2009
IEEE
163views Data Mining» more  ICDM 2009»
14 years 2 months ago
Kernel Conditional Quantile Estimation via Reduction Revisited
Quantile regression refers to the process of estimating the quantiles of a conditional distribution and has many important applications within econometrics and data mining, among ...
Novi Quadrianto, Kristian Kersting, Mark D. Reid, ...
SIBGRAPI
2008
IEEE
14 years 2 months ago
A New Training Algorithm for Pattern Recognition Technique Based on Straight Line Segments
Recently, a new Pattern Recognition technique based on straight line segments (SLSs) was presented. The key issue in this new technique is to find a function based on distances b...
João Henrique Burckas Ribeiro, Ronaldo Fumi...
IJCNN
2007
IEEE
14 years 1 months ago
Evaluation of Performance Measures for SVR Hyperparameter Selection
— To obtain accurate modeling results, it is of primal importance to find optimal values for the hyperparameters in the Support Vector Regression (SVR) model. In general, we sea...
Koen Smets, Brigitte Verdonk, Elsa Jordaan
ECBS
2006
IEEE
90views Hardware» more  ECBS 2006»
14 years 1 months ago
Evaluating Alternatives for Architecture-Oriented Refactoring
Refactoring of software systems represents an fundamental way of improving their quality properties. Large-scale refactoring has to be performed at an architectural level to execu...
Sven Wohlfarth, Matthias Riebisch