Sciweavers

140 search results - page 7 / 28
» kdd 2004
Sort
View
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 10 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton
KDD
2004
ACM
123views Data Mining» more  KDD 2004»
14 years 10 months ago
A DEA approach for model combination
This paper proposes a novel Data Envelopment Analysis (DEA) based approach for model combination. We first prove that for the 2-class classification problems DEA models identify t...
Zhiqiang Zheng, Balaji Padmanabhan, Haoqiang Zheng
ROCAI
2004
Springer
14 years 3 months ago
What ROC Curves Can't Do (and Cost Curves Can)
Abstract. This paper shows that ROC curves, as a method of visualizing classifier performance, are inadequate for the needs of Artificial Intelligence researchers in several sign...
Chris Drummond, Robert C. Holte
MICAI
2004
Springer
14 years 3 months ago
Extracting Temporal Patterns from Time Series Data Bases for Prediction of Electrical Demand
In this paper we present a technique for prediction of electrical demand based on multiple models. The multiple models are composed by several local models, each one describing a r...
J. Jesus Rico Melgoza, Juan J. Flores, Constantino...
KDD
2004
ACM
624views Data Mining» more  KDD 2004»
14 years 3 months ago
Programming the K-means clustering algorithm in SQL
Using SQL has not been considered an efficient and feasible way to implement data mining algorithms. Although this is true for many data mining, machine learning and statistical a...
Carlos Ordonez