Using Cryptography For Privacy-Preserving Data Mining
暂无分享,去创建一个
[1] Stephen A Fausti,et al. Guide to conducting tinnitus retraining therapy initial and follow-up interviews. , 2003, Journal of rehabilitation research and development.
[2] Michael G. Waldon,et al. Estimation of Average Stream Velocity , 2004 .
[3] Pawel J. Jastreboff,et al. Tinnitus Retraining Therapy: Frontmatter , 2004 .
[4] D. Baguley,et al. What progress have we made with tinnitus? , 2006, Acta oto-laryngologica. Supplementum.
[5] Pawel J. Jastreboff,et al. Tinnitus Retraining Therapy by Pawel J. Jastreboff , 2004 .
[6] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[7] Daniel A. Powers,et al. Statistical Methods for Categorical Data Analysis , 1999 .
[8] Daniel Xodo,et al. Data Mining With Ontologies: Implementations, Findings and Frameworks , 2007 .
[9] Ivan Janciak,et al. Ontology-Based Construction of Grid Data Mining Workflows , 2008 .
[10] Richard J. Povinelli,et al. TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS , 1999 .
[11] Margaret M. Jastreboff,et al. Tinnitus Retraining Therapy , 2001 .
[12] Tu Bao Ho,et al. A Hyper-Heuristic for Descriptive Rule Induction , 2007, Int. J. Data Warehous. Min..
[13] Zbigniew W. Ras,et al. Differentiated harmonic feature analysis on music information retrieval for instrument recognition , 2006, 2006 IEEE International Conference on Granular Computing.