• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 162,166
Next 10 →

The Nature of Statistical Learning Theory

by Vladimir N. Vapnik , 1999
"... Statistical learning theory was introduced in the late 1960’s. Until the 1990’s it was a purely theoretical analysis of the problem of function estimation from a given collection of data. In the middle of the 1990’s new types of learning algorithms (called support vector machines) based on the deve ..."
Abstract - Cited by 13236 (32 self) - Add to MetaCart
Statistical learning theory was introduced in the late 1960’s. Until the 1990’s it was a purely theoretical analysis of the problem of function estimation from a given collection of data. In the middle of the 1990’s new types of learning algorithms (called support vector machines) based

Maximum likelihood from incomplete data via the EM algorithm

by A. P. Dempster, N. M. Laird, D. B. Rubin - JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B , 1977
"... A broadly applicable algorithm for computing maximum likelihood estimates from incomplete data is presented at various levels of generality. Theory showing the monotone behaviour of the likelihood and convergence of the algorithm is derived. Many examples are sketched, including missing value situat ..."
Abstract - Cited by 11972 (17 self) - Add to MetaCart
A broadly applicable algorithm for computing maximum likelihood estimates from incomplete data is presented at various levels of generality. Theory showing the monotone behaviour of the likelihood and convergence of the algorithm is derived. Many examples are sketched, including missing value

Comprehensibility of Data Mining Algorithms

by unknown authors
"... Data mining attempts to identify valid, novel, potentially useful, and ultimately understandable patterns from huge volume of data. The mined patterns must be ultimately understandable because the purpose of data mining is to aid decision-making. If the decision-makers cannot understand what does a ..."
Abstract - Add to MetaCart
Data mining attempts to identify valid, novel, potentially useful, and ultimately understandable patterns from huge volume of data. The mined patterns must be ultimately understandable because the purpose of data mining is to aid decision-making. If the decision-makers cannot understand what does a

Data mining algorithms to classify students

by Cristóbal Romero, Sebastián Ventura, Pedro G. Espejo, César Hervás - In Proc. of the 1st Int. Conf. on Educational Data Mining (EDM’08), p. 187191, 2008. 49 Data Mining 2009
"... Abstract. In this paper we compare different data mining methods and techniques for classifying students based on their Moodle usage data and the final marks obtained in their respective courses. We have developed a specific mining tool for making the configuration and execution of data mining techn ..."
Abstract - Cited by 40 (2 self) - Add to MetaCart
Abstract. In this paper we compare different data mining methods and techniques for classifying students based on their Moodle usage data and the final marks obtained in their respective courses. We have developed a specific mining tool for making the configuration and execution of data mining

DATA MINING ALGORITHMS FOR RANKING PROBLEMS DATA MINING ALGORITHMS FOR RANKING PROBLEMS By

by Tianshi Jiao M. Sc
"... ii Classification is the process of finding (or training) a set of models (or functions) that describe and distinguish data classes or concepts. That is for the purpose of being able to use the models to predict the unknown class labels of instances [12]. We deal with the ranking problem in this the ..."
Abstract - Add to MetaCart
ii Classification is the process of finding (or training) a set of models (or functions) that describe and distinguish data classes or concepts. That is for the purpose of being able to use the models to predict the unknown class labels of instances [12]. We deal with the ranking problem

A Data Mining Algorithm for Generalized Web Prefetching

by Alexandros Nanopoulos, Dimitrios Katsaros, Yannis Manolopoulos - IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2003
"... Predictive Web prefetching refers to the mechanism of deducing the forthcoming page accesses of a client based on its past accesses. In this paper, we present a new context for the interpretation of Web prefetching algorithms as Markov predictors. We identify the factors that affect the performanc ..."
Abstract - Cited by 76 (16 self) - Add to MetaCart
the performance of Web prefetching algorithms. We propose a new algorithm called WM o , which is based on data mining and is proven to be a generalization of existing ones. It was designed to address their specific limitations and its characteristics include all the above factors. It compares favorably

Data Mining Algorithms for Intrusion Detection System: An Overview

by Vaishali B Kosamkar, Mumbai India, Sangita S Chaudhari
"... In recent years, network based services and network based attacks have grown significantly. The network based attacks can also be considered as some kind of intrusion. Intrusion can be defined as "any set of actions that attempt to compromise the integrity, confidentiality or availability of a ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. Several techniques such as data mining, statistics, and genetic algorithm have been used for intrusion detection. Most recently, the data mining techniques have been used to mine the normal pattern from the audit data. This paper presents the survey on data mining Algorithms applied on intrusion detection

Distributed Data Mining: Algorithms, Systems, and Applications

by Byung-Hoon Park, Hillol Kargupta , 2002
"... This paper presents a brief overview of the DDM algorithms, systems, applications, and the emerging research directions. The structure of the paper is organized as follows. We first present the related research of DDM and illustrate data distribution scenarios. Then DDM algorithms are reviewed. Subs ..."
Abstract - Cited by 70 (5 self) - Add to MetaCart
This paper presents a brief overview of the DDM algorithms, systems, applications, and the emerging research directions. The structure of the paper is organized as follows. We first present the related research of DDM and illustrate data distribution scenarios. Then DDM algorithms are reviewed

Privacy Preserving Data Mining

by Yehuda Lindell, Benny Pinkas - JOURNAL OF CRYPTOLOGY , 2000
"... In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated b ..."
Abstract - Cited by 525 (9 self) - Add to MetaCart
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated

PERFORMANCE EVALUATION AND CHARACTERIZATION OF SCALABLE DATA MINING ALGORITHMS

by Ying Liu, Jayaprakash Pisharath, Wei-keng Liao, Gokhan Memik, Alok Choudhary, Pradeep Dubey
"... Data mining has become one of the most essential tools in diverse fields. The increases in data sizes and algorithmic complexities require the computational power of chip to increase even further. In this paper, we present detailed characteristics from the hardware and software perspectives for a se ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Data mining has become one of the most essential tools in diverse fields. The increases in data sizes and algorithmic complexities require the computational power of chip to increase even further. In this paper, we present detailed characteristics from the hardware and software perspectives for a
Next 10 →
Results 1 - 10 of 162,166
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University