Author of the publication

Conquest: A Distributed Tool for Constructing Summaries of High-Dimensional Discrete Attribute Data Sets.

, , and . SDM, page 154-165. SIAM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks., , , and . ICETE (3), page 142-149. INSTICC Press, (2004)Multiple Network Alignment on Quantum Computers., , and . CoRR, (2013)Pairwise Local Alignment of Protein Interaction Networks Guided by Models of Evolution., , and . RECOMB, volume 3500 of Lecture Notes in Computer Science, page 48-65. Springer, (2005)CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets., , and . Algorithmica, 45 (3): 377-401 (2006)Fast training on large genomics data using distributed Support Vector Machines., , , , , and . COMSNETS, page 1-8. IEEE, (2016)Parallel Performance of Hierarchical Multipole Algorithms for Inductance Extraction., , and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 450-461. Springer, (2004)AIKYATAN: mapping distal regulatory elements using convolutional learning on GPU., , , , and . BMC Bioinform., 20 (1): 488:1-488:17 (2019)Sequential vs. Fixed Design Regrets in Online Learning., , , and . ISIT, page 438-443. IEEE, (2022)MODE: automated neural network model debugging via state differential analysis and input selection., , , , and . ESEC/SIGSOFT FSE, page 175-186. ACM, (2018)Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems., , , and . Peer-to-Peer Computing, page 201-208. IEEE Computer Society, (2005)