Search For:

Displaying 1-16 out of 16 total
Evolving Feature Selection
Found in: IEEE Intelligent Systems
By Huan Liu, Edward R. Dougherty, Jennifer G. Dy, Kari Torkkola, Eugene Tuv, Hanchuan Peng, Chris Ding, Fuhui Long, Michael Berens, Lance Parsons, Zheng Zhao, Lei Yu, George Forman
Issue Date:November 2005
pp. 64-76
Feature selection is a preprocessing technique, commonly used on high-dimensional data, that studies how to select a subset or list of attributes or variables that are used to construct models describing data. Wide data sets, which have a huge number of fe...
 
Feature Weighting and Selection Using Hypothesis Margin of Boosting
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Malak Alshawabkeh,Javed A. Aslam,Jennifer G. Dy,David Kaeli
Issue Date:December 2012
pp. 41-50
Utilizing the concept of hypothesis margins to measure the quality of a set of features has been a growing line of research in the last decade. However, most previous algorithms have been developed under the large hypothesis margin principles of the 1-NN a...
 
GPU-Accelerated Feature Selection for Outlier Detection Using the Local Kernel Density Ratio
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Fatemeh Azmandian,Ayse Yilmazer,Jennifer G. Dy,Javed A. Aslam,David R. Kaeli
Issue Date:December 2012
pp. 51-60
Effective outlier detection requires the data to be described by a set of features that captures the behavior of normal data while emphasizing those characteristics of outliers which make them different than normal data. In this work, we present a novel no...
 
Workload Characterization at the Virtualization Layer
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Fatemeh Azmandian,Micha Moffie,Jennifer G. Dy,Javed A. Aslam,David R. Kaeli
Issue Date:July 2011
pp. 63-72
Virtualization technology has many attractive qualities including improved security, reliability, scalability, and resource sharing/management. As a result, virtualization has been deployed on an array of platforms, from mobile devices to high end enterpri...
 
Locally Deformable Shape Model to Improve 3D Level Set Based Esophagus Segmentation
Found in: Pattern Recognition, International Conference on
By Sila Kurugol, Necmiye Ozay, Jennifer G. Dy, Gregory C. Sharp, Dana H. Brooks
Issue Date:August 2010
pp. 3955-3958
In this paper we propose a supervised 3D segmentation algorithm to locate the esophagus in thoracic CT scans using a variational framework. To address challenges due to low contrast, several priors are learned from a training set of segmented images. Our a...
 
Non-redundant Multi-view Clustering via Orthogonalization
Found in: Data Mining, IEEE International Conference on
By Ying Cui, Xiaoli Z. Fern, Jennifer G. Dy
Issue Date:October 2007
pp. 133-142
Typical clustering algorithms output a single clustering of the data. However, in real world applications, data can often be interpreted in many different ways; data can have different groupings that are reasonable and interesting from different perspectiv...
 
Unsupervised Feature Selection Applied to Content-Based Retrieval of Lung Images
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jennifer G. Dy, Carla E. Brodley, Avi Kak, Lynn S. Broderick, Alex M. Aisen
Issue Date:March 2003
pp. 373-378
<p><b>Abstract</b>—This paper describes a new hierarchical approach to content-based image retrieval called the “customized-queries” approach (CQA). Contrary to the single feature vector approach which tries to classify the query and retr...
 
Iterative Discovery of Multiple AlternativeClustering Views
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Donglin Niu,Jennifer G. Dy,and Michael I. Jordan
Issue Date:July 2014
pp. 1340-1353
Complex data can be grouped and interpreted in many different ways. Most existing clustering algorithms, however, only find one clustering solution, and provide little guidance to data analysts who may not be satisfied with that single clustering and may w...
 
Securing cloud storage systems through a virtual machine monitor
Found in: Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems (SRAS '12)
By Dana Schaa, David R. Kaeli, Fatemeh Azmandian, Javed A. Aslam, Jennifer G. Dy
Issue Date:September 2012
pp. 19-24
Cloud storage solutions have increasingly gained in popularity as they offer a convenient method of maintaining one's data all in one place, with the ability to access it from anywhere at any time. In this paper, we leverage a virtualization-based intrusio...
     
Enhanced boosting-based algorithm for intrusion detection in virtual machine environments
Found in: Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems (SRAS '12)
By Dana Schaa, David Kaeli, Javed A. Aslam, Jennifer G. Dy, Malak Alshawabkeh
Issue Date:September 2012
pp. 13-18
Intrusion detection is one of the high priority and challenging tasks in many technologies, particularly, in virtualization technology. There is a need to safeguard these systems from known vulnerabilities and at the same time take steps to detect new and ...
     
Learning multiple nonredundant clusterings
Found in: ACM Transactions on Knowledge Discovery from Data (TKDD)
By Jennifer G. Dy, Xiaoli Z. Fern, Ying Cui
Issue Date:October 2010
pp. 1-32
Real-world applications often involve complex data that can be interpreted in many different ways. When clustering such data, there may exist multiple groupings that are reasonable and interesting from different perspectives. This is especially true for hi...
     
Medical coding classification by leveraging inter-code relationships
Found in: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '10)
By Glenn Fung, Jennifer G. Dy, Romer Rosales, Yan Yan
Issue Date:July 2010
pp. 193-202
Medical coding or classification is the process of transforming information contained in patient medical records into standard predefined medical codes. There are several worldwide accepted medical coding conventions associated with diagnoses and medical p...
     
Learning methods for lung tumor markerless gating in image-guided radiotherapy
Found in: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '08)
By Brian M. Alexander, Gregory C. Sharp, Jennifer G. Dy, Steve B. Jiang, Ying Cui
Issue Date:August 2008
pp. 5-6
In an idealized gated radiotherapy treatment, radiation is delivered only when the tumor is at the right position. For gated lung cancer radiotherapy, it is difficult to generate accurate gating signals due to the large uncertainties when using external su...
     
A hierarchical method for multi-class support vector machines
Found in: Twenty-first international conference on Machine learning (ICML '04)
By Jennifer G. Dy, Volkan Vural
Issue Date:July 2004
pp. 182-182
We introduce a framework, which we call Divide-by-2 (DB2), for extending support vector machines (SVM) to multi-class problems. DB2 offers an alternative to the standard one-against-one and one-against-rest algorithms. For an N class problem, DB2 produces ...
     
Automated hierarchical mixtures of probabilistic principal component analyzers
Found in: Twenty-first international conference on Machine learning (ICML '04)
By Jennifer G. Dy, Ting Su
Issue Date:July 2004
pp. 182-182
Many clustering algorithms fail when dealing with high dimensional data. Principal component analysis (PCA) is a popular dimensionality reduction algorithm. However, it assumes a single multivariate Gaussian model, which provides a global linear projection...
     
Visualization and interactive feature selection for unsupervised data
Found in: Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '00)
By Carla E. Brodley, Jennifer G. Dy
Issue Date:August 2000
pp. 360-364
With over 800 million pages covering most areas of human endeavor, the World-wide Web is a fertile ground for data mining research to make a difference to the effectiveness of information search. Today, Web surfers access the Web through two dominant inter...
     
 1