Skip to main content

and
  1. No Access

    Article

    Fast and memory-efficient algorithms for high-order Tucker decomposition

    Multi-aspect data appear frequently in web-related applications. For example, product reviews are quadruplets of the form (user, product, keyword, timestamp), and search-engine logs are quadruplets of the form...

    Jiyuan Zhang, **oh Oh, Kijung Shin in Knowledge and Information Systems (2020)

  2. No Access

    Reference Work Entry In depth

    Bootstrap

    Hwanjo Yu in Encyclopedia of Database Systems (2018)

  3. No Access

    Reference Work Entry In depth

    Support Vector Machine

    Hwanjo Yu in Encyclopedia of Database Systems (2018)

  4. No Access

    Living Reference Work Entry In depth

    Support Vector Machine

    Hwanjo Yu in Encyclopedia of Database Systems

  5. No Access

    Living Reference Work Entry In depth

    Bootstrap

    Hwanjo Yu in Encyclopedia of Database Systems

  6. No Access

    Book and Conference Proceedings

    Database Systems for Advanced Applications

    17th International Conference, DASFAA 2012, International Workshops: FlashDB, ITEMS, SNSM, SIM3, DQDI, Busan, South Korea, April 15-19, 2012. Proceedings

    Hwanjo Yu, Ge Yu, Wynne Hsu in Lecture Notes in Computer Science (2012)

  7. No Access

    Chapter and Conference Paper

    Data Management Challenges and Opportunities in Cloud Computing

    Analyzing large data is a challenging problem today, as there is an increasing trend of applications being expected to deal with vast amounts of data that usually do not fit in the main memory of a single mach...

    Kyuseok Shim, Sang Kyun Cha, Lei Chen in Database Systems for Advanced Applications (2012)

  8. No Access

    Reference Work Entry In depth

    Bootstrap

    Hwanjo Yu in Encyclopedia of Database Systems (2009)

  9. No Access

    Reference Work Entry In depth

    Support Vector Machine

    Hwanjo Yu in Encyclopedia of Database Systems (2009)

  10. No Access

    Article

    Privacy-preserving SVM classification

    Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security concerns restrict this access, t...

    Jaideep Vaidya, Hwanjo Yu, **aoqian Jiang in Knowledge and Information Systems (2008)

  11. No Access

    Chapter and Conference Paper

    Privacy-Preserving SVM Classification on Vertically Partitioned Data

    Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharing of data, thus derailing dat...

    Hwanjo Yu, Jaideep Vaidya in Advances in Knowledge Discovery and Data Mining (2006)