Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Towards Description of Block Model on Graph

    Existing block modeling methods can detect communities as blocks. However it remains a challenge to easily explain to a human why nodes belong to the same block. Such a description is very useful for answering wh...

    Zilong Bai, S. S. Ravi, Ian Davidson in Machine Learning and Knowledge Discovery i… (2021)

  2. No Access

    Chapter and Conference Paper

    A Framework for Deep Constrained Clustering - Algorithms and Advances

    The area of constrained clustering has been extensively explored by researchers and used by practitioners. Constrained clustering formulations exist for popular algorithms such as k-means, mixture models, and ...

    Hong**g Zhang, Sugato Basu, Ian Davidson in Machine Learning and Knowledge Discovery i… (2020)

  3. No Access

    Chapter and Conference Paper

    Constrained Clustering via Post-processing

    Constrained clustering has received much attention since its inception as the ability to add weak supervision into clustering has many uses. Most existing work is algorithm-specific, limited to simple together...

    Nguyen-Viet-Dung Nghiem, Christel Vrain, Thi-Bich-Hanh Dao in Discovery Science (2020)

  4. No Access

    Chapter and Conference Paper

    Generic Constraint-Based Block Modeling Using Constraint Programming

    Block modeling has been used extensively in many domains including social science, spatial temporal data analysis and even medical imaging

    Alex Mattenet, Ian Davidson in Principles and Practice of Constraint Prog… (2019)

  5. Chapter and Conference Paper

    Constrained Tensor Decomposition via Guidance: Increased Inter and Intra-Group Reliability in fMRI Analyses

    Recently, Davidson and his colleagues introduced a promising new approach to analyzing functional Magnetic Resonance Imaging (fMRI) that suggested a more appropriate analytic approach is one that views the spa...

    Peter B. Walker, Sean Gilpin, Sidney Fooshee in Foundations of Augmented Cognition (2015)

  6. No Access

    Chapter and Conference Paper

    Learning Automated Agents from Historical Game Data via Tensor Decomposition

    War games and military war games, in general, are extensively played throughout the world to help train people and see the effects of policies. Currently, these games are played by humans at great expense and ...

    Peter Walker in Social Computing, Behavioral-Cultural Modeling, and Prediction (2015)

  7. No Access

    Chapter and Conference Paper

    Complex Interactions in Social and Event Network Analysis

    Modern social network analytic techniques, such as centrality analysis, outlier detection, and/or segmentation, are limited in that they typically only identify interactions within the dataset occurring as a f...

    Peter B. Walker, Sidney G. Fooshee in Social Computing, Behavioral-Cultural Mode… (2015)

  8. No Access

    Chapter and Conference Paper

    Keyless Steganography in Spatial Domain Using Energetic Pixels

    Steganography is the field of hiding messages in apparently innocuous media (e.g. images). Hiding messages in the pixel intensities of images is a popular approach in spatial domain steganography. However, sin...

    Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi in Information Systems Security (2012)

  9. Chapter and Conference Paper

    When Efficient Model Averaging Out-Performs Boosting and Bagging

    The Bayes optimal classifier (BOC) is an ensemble technique used extensively in the statistics literature. However, compared to other ensemble techniques such as bagging and boosting, BOC is less known and rar...

    Ian Davidson, Wei Fan in Knowledge Discovery in Databases: PKDD 2006 (2006)

  10. Chapter and Conference Paper

    Measuring Constraint-Set Utility for Partitional Clustering Algorithms

    Clustering with constraints is an active area of machine learning and data mining research. Previous empirical work has convincingly shown that adding constraints to clustering improves performance, with respe...

    Ian Davidson, Kiri L. Wagstaff, Sugato Basu in Knowledge Discovery in Databases: PKDD 2006 (2006)

  11. No Access

    Chapter and Conference Paper

    A Dynamic Adaptive Sampling Algorithm (DASA) for Real World Applications: Finger Print Recognition and Face Recognition

    In many real world problems, data mining algorithms have access to massive amounts of data (defense and security). Mining all the available data is prohibitive due to computational (time and memory) constraint...

    Ashwin Satyanarayana, Ian Davidson in Foundations of Intelligent Systems (2005)

  12. Chapter and Conference Paper

    Agglomerative Hierarchical Clustering with Constraints: Theoretical and Empirical Results

    We explore the use of instance and cluster-level constraints with agglomerative hierarchical clustering. Though previous work has illustrated the benefits of using constraints for non-hierarchical clustering, ...

    Ian Davidson, S. S. Ravi in Knowledge Discovery in Databases: PKDD 2005 (2005)

  13. No Access

    Chapter and Conference Paper

    An Information Theoretic Optimal Classifier for Semi-supervised Learning

    Model uncertainty refers to the risk associated with basing prediction on only one model. In semi-supervised learning, this uncertainty is greater than in supervised learning (for the same total number of inst...

    Ke Yin, Ian Davidson in Intelligent Data Engineering and Automated Learning – IDEAL 2004 (2004)

  14. No Access

    Chapter and Conference Paper

    Further Applications of a Particle Visualization Framework

    Previous work introduced a 3D particle visualization framework that viewed each data point as a particle affected by gravitational forces. We showed the use of this tool for visualizing cluster results and ano...

    Ke Yin, Ian Davidson in Advances in Knowledge Discovery and Data Mining (2004)

  15. No Access

    Chapter and Conference Paper

    Using background contextual knowledge for documents representation

    We describe our approach to document representation that captures contextual dependencies between terms in a corpus and makes use of these dependencies to represent documents. We have tried our representation ...

    Arkadi Kosmynin, Ian Davidson in Principles of Document Processing (1997)

  16. No Access

    Chapter and Conference Paper

    The Design of Non-Linear Structures Using a Small Micro-Computer

    Some structures combine a requirement for a high degree of safety with the drawback of difficult structural analysis. An example which may be cited is a prestressed concrete pressure vessel for a nuclear react...

    Ian Davidson in Engineering Software IV (1985)