Filters








63,979 Hits in 8.6 sec

What is the Dimension of Your Binary Data?

Nikolaj Tatti, Taneli Mielikainen, Aristides Gionis, Heikki Mannila
2006 IEEE International Conference on Data Mining. Proceedings  
We consider the problem of defining a robust measure of dimension for 0/1 datasets, and show that the basic idea of fractal dimension can be adapted for binary data.  ...  Defining the effective dimensionality of such a dataset is a nontrivial problem.  ...  VC-dimension measures the dimensionality of discrete data, but it is rather conservative as a binary dataset having VC-dimension d means that there are d columns such that the projection of the dataset  ... 
doi:10.1109/icdm.2006.167 dblp:conf/icdm/TattiMGM06 fatcat:7ferlvezyrfsbaqsnih3j3sgne

Enabling Data Subjects to Remain Data Owners [chapter]

Eliza Papadopoulou, Alex Stobart, Nick K. Taylor, M. Howard Williams
2015 Smart Innovation, Systems and Technologies  
Firstly, the personal data that a user supplies becomes the property of the service provider, which means that the data subject loses control over what is subsequently done with their data.  ...  Different levels of service can be provided depending on what personal data a user is prepared to disclose.  ...  There is a further dimension of relevance to DWP's data sharing policy.  ... 
doi:10.1007/978-3-319-19728-9_20 fatcat:hnprbfaembgi3oriamwwxd3pne

RFID Data Management [chapter]

Sapna Tyagi, M Ayoub, A Q
2010 Radio Frequency Identification Fundamentals and Applications Bringing Research to Practice  
The binary representation of the tag HEX value is shown as follows.  ...  What makes this different from the traditional use of data warehousing technology for business intelligence is that an active data warehouse is a closed loop system.  ...  /rfid-data-management © 2010 The Author(s).  ... 
doi:10.5772/8001 fatcat:6fsiucaxinhljpai2f7g2b2g2m

A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data

Arindam Kumar Paul
2016 International Journal on Data Science and Technology  
It is just a developed and highly secured model for just converting plain-text to cipher text.  ...  We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.  ...  Working Process At first, let me explain what kind of information can I get from a fingerprint image and what is the output..  ... 
doi:10.11648/j.ijdst.20160204.12 fatcat:xl5wjmgjx5e2naga72gfpd75q4

SEER: A Graphical Tool for Multidimensional and Categorical Data

Chris Chiu, Ronald Fecso
2021 Journal of Data Science  
The SEER technique is illustrated by using a national survey, the Survey of Doctorate Recipients (SDR), administered by the National Science Foundation (NSF).  ...  data into groups to enable policy makers or researchers to observe the factors associated with the changing patterns.  ...  The research in this article does not represent the official positions of the funding organizations.  ... 
doi:10.6339/jds.2004.02(1).127 fatcat:hfxnjccp3neu3dpm35eslix5dq

Beyond data

Xavier Amatriain
2013 Proceedings of the 22nd ACM international conference on Conference on information & knowledge management - CIKM '13  
Our current product offering is nowadays focused around instant video streaming, and our data is now many orders of magnitude larger.  ...  Besides the ratings, we now also use information such as what our members play, browse, or search.  ...  Beyond the optimization of a given offline metric, what we are really pursuing is the impact of a method on the business.  ... 
doi:10.1145/2505515.2514691 dblp:conf/cikm/Amatriain13 fatcat:a732kmtsijgczj4376icdjgxl4

Data base management systems

Mitchell H. Goldstein
1986 National Productivity Review  
Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data.  ...  Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data.  ...  The specifications of the source of funding for the research if appropriate can be included. Suppliers of resources may be mentioned along with address.  ... 
doi:10.1002/npr.4040050212 fatcat:k3durihnkvajleow3nzvjhjt2e

Step 3: Collecting Data [chapter]

Sara Dolnicar, Bettina Grün, Friedrich Leisch
2018 Management for Professionals  
Better is what works for your product or service at the least possible cost.  ...  dimension of interest.  ... 
doi:10.1007/978-981-10-8818-6_5 fatcat:kunnyqkv4vaerag3ilhkaz4rhe

Data analysis recipes: Fitting a model to data [article]

David W. Hogg, Dustin Lang (Toronto, Princeton)
2010 arXiv   pre-print
We go through the many considerations involved in fitting a model to data, using as an example the fit of a straight line to a set of points in a two-dimensional plane.  ...  Standard weighted least-squares fitting is only appropriate when there is a dimension along which the data points have negligible uncertainties, and another along which all the uncertainties can be described  ...  objectively reject bad data points, we must add to the problem a set of N binary integers q i , one per data point, each of which is unity if the ith data point is good, and zero if the ith data point  ... 
arXiv:1008.4686v1 fatcat:ro5lbaxuqnda3pv3y4vavgyq3e

Simulation experiments: Better data, not just big data

Susan M. Sanchez
2014 Proceedings of the Winter Simulation Conference 2014  
Yet a key drawback to the big data paradigm is that it relies on observational data-limiting the types of insights that can be gained. The simulation world is different.  ...  A "data farming" metaphor captures the notion of purposeful data generation from simulation models. Large-scale designed experiments let us grow the simulation output efficiently and effectively.  ...  Portions of this paper are adapted from and Sanchez, Sanchez, and Wan (2014) . Thanks to Paul Sanchez for helpful suggestions.  ... 
doi:10.1109/wsc.2014.7019942 dblp:conf/wsc/Sanchez14 fatcat:otfm2jlwqjagnolnyijympfasi

Simulation experiments: Better data, not just big data

Susan M. Sanchez
2015 2015 Winter Simulation Conference (WSC)  
Yet a key drawback to the big data paradigm is that it relies on observational data-limiting the types of insights that can be gained. The simulation world is different.  ...  A "data farming" metaphor captures the notion of purposeful data generation from simulation models. Large-scale designed experiments let us grow the simulation output efficiently and effectively.  ...  Portions of this paper are adapted from and Sanchez, Sanchez, and Wan (2014) . Thanks to Paul Sanchez for helpful suggestions.  ... 
doi:10.1109/wsc.2015.7408217 dblp:conf/wsc/Sanchez15 fatcat:fdhnox7q4bhnrcwwj3d5ykku44

Abstractions for recursive pointer data structures

Laurie J. Hendren, Joseph Hummell, Alexandru Nicolau
1992 Proceedings of the ACM SIGPLAN 1992 conference on Programming language design and implementation - PLDI '92  
Our approach is based on a mechanism for the Abstract Description of Data Structures (ADDS), which makes explicit the important properties, such as dimensionalit y, of pointer data structures.  ...  Even though impressive progress has been made in the area of optimizing and parallelizing programs with arrays, the application of similar techniques to programs with pointer data structures has remained  ...  Next, think of your structure as having "dimensions, " different paths emanating from the origin, with typically one dimension per path.  ... 
doi:10.1145/143095.143138 dblp:conf/pldi/HendrenHN92 fatcat:dcszoooao5eshc7yn2rjaihyle

Data Justice

Caroline Kühn
2021 Zenodo  
As a complement to the notion of data justice, which is mainly a conceptual one, data feminism, the data ethics canvas, and the seven inequities held in power are going to be described as actionable analytical  ...  In this unit, we explore the concept of data justice and the different interpretations of the idea.  ...  It encourages you to ask important questions about projects that use data, and reflect on the responses. These might be: What is your primary purpose for using data in this project?  ... 
doi:10.5281/zenodo.5137474 fatcat:i4c3ejsdhbd6hl3t2cnyolbjhy

Protecting Against Data Mining through Samples [chapter]

Chris Clifton
2000 IFIP Advances in Information and Communication Technology  
The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "probabilistic" inferences possible with data mining.  ...  Data mining introduces new problems in database security.  ...  Since the vc-dimension is the largest k such that the shatter coefficient = 2k, we can see that the vc-dimension for binary decision rules is the number of ,distinct rules.  ... 
doi:10.1007/978-0-387-35508-5_13 fatcat:mvd25y2q7vhhdbhnmzavaz6ivu

What is my data worth? From data properties to data value [article]

Kalapriya Kannan and Rema Ananthanarayanan and Sameep Mehta
2018 arXiv   pre-print
Further, there is overall consensus that good data is important for any analysis but there is no independent definition of what constitutes good data.  ...  The "value" of data is not understood quantitatively until it is used in an application and output is evaluated, and hence currently it is not possible to assess the value of large amounts of data that  ...  ~ã ) What is the data structure?  ... 
arXiv:1811.04665v1 fatcat:vu6flfhrjfhknacnko4p5kwlxy
« Previous Showing results 1 — 15 out of 63,979 results