• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 10,723
Next 10 →

Survey of clustering data mining techniques

by Pavel Berkhin , 2002
"... Accrue Software, Inc. Clustering is a division of data into groups of similar objects. Representing the data by fewer clusters necessarily loses certain fine details, but achieves simplification. It models data by its clusters. Data modeling puts clustering in a historical perspective rooted in math ..."
Abstract - Cited by 408 (0 self) - Add to MetaCart
Accrue Software, Inc. Clustering is a division of data into groups of similar objects. Representing the data by fewer clusters necessarily loses certain fine details, but achieves simplification. It models data by its clusters. Data modeling puts clustering in a historical perspective rooted

A Survey on Transfer Learning

by Sinno Jialin Pan, Qiang Yang
"... A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For example, we sometimes have a classification task i ..."
Abstract - Cited by 459 (24 self) - Add to MetaCart
by avoiding much expensive data labeling efforts. In recent years, transfer learning has emerged as a new learning framework to address this problem. This survey focuses on categorizing and reviewing the current progress on transfer learning for classification, regression and clustering problems

Similarity search in high dimensions via hashing

by Aristides Gionis, Piotr Indyk, Rajeev Motwani , 1999
"... The nearest- or near-neighbor query problems arise in a large variety of database applications, usually in the context of similarity searching. Of late, there has been increasing interest in building search/index structures for performing similarity search over high-dimensional data, e.g., image dat ..."
Abstract - Cited by 641 (10 self) - Add to MetaCart
databases, document collections, time-series databases, and genome databases. Unfortunately, all known techniques for solving this problem fall prey to the \curse of dimensionality. " That is, the data structures scale poorly with data dimensionality; in fact, if the number of dimensions exceeds 10

Quantization

by Robert M. Gray, David L. Neuhoff - IEEE TRANS. INFORM. THEORY , 1998
"... The history of the theory and practice of quantization dates to 1948, although similar ideas had appeared in the literature as long ago as 1898. The fundamental role of quantization in modulation and analog-to-digital conversion was first recognized during the early development of pulsecode modula ..."
Abstract - Cited by 884 (12 self) - Add to MetaCart
provide a theory for quantization as analog-to-digital conversion and as data compression. Beginning with these three papers of fifty years ago, we trace the history of quantization from its origins through this decade, and we survey the fundamentals of the theory and many of the popular and promising

Privacy-Preserving Data Publishing: A Survey on Recent Developments

by Benjamin C. M. Fung, Ke Wang, Rui Chen, Philip S. Yu
"... The collection of digital information by governments, corporations, and individuals has created tremendous opportunities for knowledge- and information-based decision making. Driven by mutual benefits, or by regulations that require certain data to be published, there is a demand for the exchange an ..."
Abstract - Cited by 219 (16 self) - Add to MetaCart
be published, and agreements on the use of published data. This approach alone may lead to excessive data distortion or insufficient protection. Privacy-preserving data publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Recently, PPDP has received

Value-Based Software Engineering

by Barry W. Boehm - ACM Software Engineering Notes , 2003
"... Abstract—This paper provides a definition of the term “software engineering ” and a survey of the current state of the art and likely future trends in the field. The survey covers the technology available in the various phases of the software life cycle—requirements engineering, design, coding, test ..."
Abstract - Cited by 472 (32 self) - Add to MetaCart
Abstract—This paper provides a definition of the term “software engineering ” and a survey of the current state of the art and likely future trends in the field. The survey covers the technology available in the various phases of the software life cycle—requirements engineering, design, coding

A SURVEY OF PERTURBATION TECHNIQUE FOR PRIVACY–PRESERVING OF DATA

by Twinkle Ankleshwaria, Prof J. S. Dhobi
"... In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data Data perturbation is a popular technique for privacy preserving data mining. The approach protects t ..."
Abstract - Add to MetaCart
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data Data perturbation is a popular technique for privacy preserving data mining. The approach protects

A Survey of Perturbation Technique For Privacy-Preserving of Data

by Lokesh Patel, Prof Ravindra Gupta, M. Tech
"... Abstract — Privacy concerns over the ever-increasing gathering of personal information by various institutions led to the development of privacy preserving data. The approach protects the privacy of the data by perturbing the data through a method. The major challenge of data perturbation is to achi ..."
Abstract - Add to MetaCart
is to achieve the desired result between the level of data privacy and the level of data utility. Data privacy and data utility are commonly considered as a pair of conflicting requirements in privacy-preserving of data for applications and mining systems. Multiplicative perturbation algorithms aim at improving

Privacy Privacy-Preserving Data

by Mining Why
"... Data mining is under attack from privacy advocates because of a misunderstanding about what it actually is and a valid concern about how it’s generally done. This article shows how technology from the security community can change data mining for the better, providing all its benefits while still ma ..."
Abstract - Add to MetaCart
privacy is a growing challenge. But is it even possible to perform large-scale data analysis without violating privacy? Given sufficient care, we believe the answer is yes. In this article, we’ll describe why data mining doesn’t inherently threaten privacy, and we’ll survey two approaches that enable

A mammalian microRNA expression atlas based on small RNA library sequencing.

by Pablo Landgraf , Mirabela Rusu , Robert Sheridan , Alain Sewer , Nicola Iovino , Alexei Aravin , Sé Bastien Pfeffer , Amanda Rice , Alice O Kamphorst , Markus Landthaler , Carolina Lin , Nicholas D Socci , Leandro Hermida , Valerio Fulci , Sabina Chiaretti , Robin Foà , Julia Schliwka , Uta Fuchs , Astrid Novosel , Roman-Ulrich Mü , Bernhard Schermer , Ute Bissels , Jason Inman , Quang Phan , David B Weir , Ruchi Choksi , Gabriella De Vita , Daniela Frezzetti , Hans-Ingo Trompeter , Veit Hornung , Grace Teng , Gunther Hartmann , Miklos Palkovits , Roberto Di Lauro , Peter Wernet , Giuseppe Macino , Charles E Rogler , James W Nagle , Jingyue Ju , F Nina Papavasiliou , Thomas Benzing , Peter Lichter , Wayne Tam , Michael J Brownstein , Andreas Bosio , James J Russo , Chris Sander , Mihaela Zavolan , Thomas Tuschl - Cell, , 2007
"... SUMMARY MicroRNAs (miRNAs) are small noncoding regulatory RNAs that reduce stability and/or translation of fully or partially sequencecomplementary target mRNAs. In order to identify miRNAs and to assess their expression patterns, we sequenced over 250 small RNA libraries from 26 different organ sy ..."
Abstract - Cited by 418 (4 self) - Add to MetaCart
systems and cell types of human and rodents that were enriched in neuronal as well as normal and malignant hematopoietic cells and tissues. We present expression profiles derived from clone count data and provide computational tools for their analysis. Unexpectedly, a relatively small set of miRNAs, many
Next 10 →
Results 11 - 20 of 10,723
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University