A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
What is the Dimension of Your Binary Data?
2006
IEEE International Conference on Data Mining. Proceedings
We consider the problem of defining a robust measure of dimension for 0/1 datasets, and show that the basic idea of fractal dimension can be adapted for binary data. ...
Defining the effective dimensionality of such a dataset is a nontrivial problem. ...
VC-dimension measures the dimensionality of discrete data, but it is rather conservative as a binary dataset having VC-dimension d means that there are d columns such that the projection of the dataset ...
doi:10.1109/icdm.2006.167
dblp:conf/icdm/TattiMGM06
fatcat:7ferlvezyrfsbaqsnih3j3sgne
Enabling Data Subjects to Remain Data Owners
[chapter]
2015
Smart Innovation, Systems and Technologies
Firstly, the personal data that a user supplies becomes the property of the service provider, which means that the data subject loses control over what is subsequently done with their data. ...
Different levels of service can be provided depending on what personal data a user is prepared to disclose. ...
There is a further dimension of relevance to DWP's data sharing policy. ...
doi:10.1007/978-3-319-19728-9_20
fatcat:hnprbfaembgi3oriamwwxd3pne
RFID Data Management
[chapter]
2010
Radio Frequency Identification Fundamentals and Applications Bringing Research to Practice
The binary representation of the tag HEX value is shown as follows. ...
What makes this different from the traditional use of data warehousing technology for business intelligence is that an active data warehouse is a closed loop system. ...
/rfid-data-management © 2010 The Author(s). ...
doi:10.5772/8001
fatcat:6fsiucaxinhljpai2f7g2b2g2m
A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data
2016
International Journal on Data Science and Technology
It is just a developed and highly secured model for just converting plain-text to cipher text. ...
We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely. ...
Working Process At first, let me explain what kind of information can I get from a fingerprint image and what is the output.. ...
doi:10.11648/j.ijdst.20160204.12
fatcat:xl5wjmgjx5e2naga72gfpd75q4
SEER: A Graphical Tool for Multidimensional and Categorical Data
2021
Journal of Data Science
The SEER technique is illustrated by using a national survey, the Survey of Doctorate Recipients (SDR), administered by the National Science Foundation (NSF). ...
data into groups to enable policy makers or researchers to observe the factors associated with the changing patterns. ...
The research in this article does not represent the official positions of the funding organizations. ...
doi:10.6339/jds.2004.02(1).127
fatcat:hfxnjccp3neu3dpm35eslix5dq
Beyond data
2013
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management - CIKM '13
Our current product offering is nowadays focused around instant video streaming, and our data is now many orders of magnitude larger. ...
Besides the ratings, we now also use information such as what our members play, browse, or search. ...
Beyond the optimization of a given offline metric, what we are really pursuing is the impact of a method on the business. ...
doi:10.1145/2505515.2514691
dblp:conf/cikm/Amatriain13
fatcat:a732kmtsijgczj4376icdjgxl4
Data base management systems
1986
National Productivity Review
Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data. ...
Cryptography is an art of scrambling the data in order to provide security and confidentiality. Cryptography is being used in order for the securely transmission of the data. ...
The specifications of the source of funding for the research if appropriate can be included. Suppliers of resources may be mentioned along with address. ...
doi:10.1002/npr.4040050212
fatcat:k3durihnkvajleow3nzvjhjt2e
Step 3: Collecting Data
[chapter]
2018
Management for Professionals
Better is what works for your product or service at the least possible cost. ...
dimension of interest. ...
doi:10.1007/978-981-10-8818-6_5
fatcat:kunnyqkv4vaerag3ilhkaz4rhe
Data analysis recipes: Fitting a model to data
[article]
2010
arXiv
pre-print
We go through the many considerations involved in fitting a model to data, using as an example the fit of a straight line to a set of points in a two-dimensional plane. ...
Standard weighted least-squares fitting is only appropriate when there is a dimension along which the data points have negligible uncertainties, and another along which all the uncertainties can be described ...
objectively reject bad data points, we must add to the problem a set of N binary integers q i , one per data point, each of which is unity if the ith data point is good, and zero if the ith data point ...
arXiv:1008.4686v1
fatcat:ro5lbaxuqnda3pv3y4vavgyq3e
Simulation experiments: Better data, not just big data
2014
Proceedings of the Winter Simulation Conference 2014
Yet a key drawback to the big data paradigm is that it relies on observational data-limiting the types of insights that can be gained. The simulation world is different. ...
A "data farming" metaphor captures the notion of purposeful data generation from simulation models. Large-scale designed experiments let us grow the simulation output efficiently and effectively. ...
Portions of this paper are adapted from and Sanchez, Sanchez, and Wan (2014) . Thanks to Paul Sanchez for helpful suggestions. ...
doi:10.1109/wsc.2014.7019942
dblp:conf/wsc/Sanchez14
fatcat:otfm2jlwqjagnolnyijympfasi
Simulation experiments: Better data, not just big data
2015
2015 Winter Simulation Conference (WSC)
Yet a key drawback to the big data paradigm is that it relies on observational data-limiting the types of insights that can be gained. The simulation world is different. ...
A "data farming" metaphor captures the notion of purposeful data generation from simulation models. Large-scale designed experiments let us grow the simulation output efficiently and effectively. ...
Portions of this paper are adapted from and Sanchez, Sanchez, and Wan (2014) . Thanks to Paul Sanchez for helpful suggestions. ...
doi:10.1109/wsc.2015.7408217
dblp:conf/wsc/Sanchez15
fatcat:fdhnox7q4bhnrcwwj3d5ykku44
Abstractions for recursive pointer data structures
1992
Proceedings of the ACM SIGPLAN 1992 conference on Programming language design and implementation - PLDI '92
Our approach is based on a mechanism for the Abstract Description of Data Structures (ADDS), which makes explicit the important properties, such as dimensionalit y, of pointer data structures. ...
Even though impressive progress has been made in the area of optimizing and parallelizing programs with arrays, the application of similar techniques to programs with pointer data structures has remained ...
Next, think of your structure as having "dimensions, " different paths emanating from the origin, with typically one dimension per path. ...
doi:10.1145/143095.143138
dblp:conf/pldi/HendrenHN92
fatcat:dcszoooao5eshc7yn2rjaihyle
Data Justice
2021
Zenodo
As a complement to the notion of data justice, which is mainly a conceptual one, data feminism, the data ethics canvas, and the seven inequities held in power are going to be described as actionable analytical ...
In this unit, we explore the concept of data justice and the different interpretations of the idea. ...
It encourages you to ask important questions about projects that use data, and reflect on the responses. These might be: What is your primary purpose for using data in this project? ...
doi:10.5281/zenodo.5137474
fatcat:i4c3ejsdhbd6hl3t2cnyolbjhy
Protecting Against Data Mining through Samples
[chapter]
2000
IFIP Advances in Information and Communication Technology
The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "probabilistic" inferences possible with data mining. ...
Data mining introduces new problems in database security. ...
Since the vc-dimension is the largest k such that the shatter coefficient = 2k, we can see that the vc-dimension for binary decision rules is the number of ,distinct rules. ...
doi:10.1007/978-0-387-35508-5_13
fatcat:mvd25y2q7vhhdbhnmzavaz6ivu
What is my data worth? From data properties to data value
[article]
2018
arXiv
pre-print
Further, there is overall consensus that good data is important for any analysis but there is no independent definition of what constitutes good data. ...
The "value" of data is not understood quantitatively until it is used in an application and output is evaluated, and hence currently it is not possible to assess the value of large amounts of data that ...
~ã ) What is the data structure? ...
arXiv:1811.04665v1
fatcat:vu6flfhrjfhknacnko4p5kwlxy
« Previous
Showing results 1 — 15 out of 63,979 results