Journal of shanghai Jiaotong University (Science) ›› 2012, Vol. 17 ›› Issue (2): 245-250.doi: 10.1007/s12204-012-1261-5
• Articles • Previous Articles Next Articles
ZIA-UR REHMAN Muhammad1∗, LI Tian-rui1 (李天瑞), LI Tao2 (李涛)
Online:
2012-04-28
Published:
2012-05-31
CLC Number:
ZIA-UR REHMAN Muhammad1, LI Tian-rui1 (李天瑞), LI Tao2 (李涛). Exploiting Empirical Variance for Data Stream Classification[J]. Journal of shanghai Jiaotong University (Science), 2012, 17(2): 245-250.
[1] Gaber M M, Zaslavsky A, Krishnaswamy S. Mining data streams: A review [J]. ACM SIGMOD Record,2005, 34(2): 18-26. [2] Stonebraker M, Cetintemel U, Zdonik S. The 8 requirements of real-time stream processing [J]. ACM SIGMOD Record, 2005, 34(4): 42-47. [3] Han J, Kamber M. Data mining: Concepts and techniques [M]. San Francisco, USA: Morgan Kaufmann Publishers, 2006. [4] Domingos P, Hulten G. Mining high-speed data streams [C]//Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Boston, USA: ACM, 2000: 71-80. [5] Kirkby R. Improving Hoeffding trees [D]. Hamilton New Zealand: Department of Computer Science, University of Waikato, 2007. [6] Jin R, Agrawal G. Efficient decision tree construction on streaming data [C]//Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington, USA:ACM, 2003: 571-576. [7] Bennett G. Probability inequalities for the sum of independent random variables [J]. Journal of the American Statistical Association, 1962, 57(297): 33-45. [8] Hoeffding W. Probability inequalities for sums of bounded random variables [J]. Journal of the American Statistical Association, 1963, 58(301): 13-30. [9] Audibert J Y, Munos R, Szepesv´ari C. Tuning bandit algorithms in stochastic environments [C]//Proceedings of the 18th International Conference on Algorithmic Learning Theory. Sendai, Japan: LNCS, 2007: 150-165. [10] Shivaswamy P K, Jebara T. Empirical Bernstein boosting [J]. Journal of Machine Learning Research, 2010, 9: 733-740. [11] Cesa-Bianchi N, Conconi A, Gentile C. A secondorder perceptron algorithm [J]. SIAM Journal on Computing, 2005, 34(3): 640-668. [12] Crammer K, Mohri M, Pereira F. Gaussian margin machines [C]// Proceedings of the 12th International Conference on Artificial Intelligence and Statistics. Florida, USA: JMLR W&CP, 2009: 105-112. [13] Mnih V, Szepesv´ari C, Audibert J Y. Empirical Bernstein stopping [C]//Proceedings of the 25th International Conference on Machine Learning. Helsinki, Finland: ACM, 2008: 672-679. [14] Jin R, Hong H, Wang H, et al. Computing label-constraint reachability in graph databases [C]//Proceedings of the International Conference on Management of Data. Indiana, USA: ACM, 2010: 123-134. [15] Heidrich-Meisner V, Igel C. Hoeffding and Bernstein races for selecting policies in evolutionary direct policy search [C]//Proceedings of the 26th Annual International Conference on Machine Learning. Quebec, Canada: ACM, 2009: 401-408. |
[1] | ZHANG Baolei1, WU Yuke2, TANG Yufeng2. Fault Diagnosis of Electric Slip Ring of EPSO Single Point Mooring Base on CART Decision Tree [J]. Ocean Engineering Equipment and Technology, 2024, 11(2): 95-100. |
[2] | CHEN Xiao1,2 (陈潇), ZHANG Rui1,2 (张瑞), TANG Xinyi1,2 (汤心溢), QIAN Juan3∗ (钱娟). Prediction of Pediatric Sepsis Using a Deep Encoding Network with Cross Features [J]. J Shanghai Jiaotong Univ Sci, 2024, 29(1): 131-140. |
[3] | LI Chuan, NIE Yiwen, LIU Junwei, MENG Fanqin, SHEN Xiaojing . A Robust Multi-Algorithm Fusion Track Initiation Algorithm Based on Machine Learning [J]. Air & Space Defense, 2022, 5(1): 20-24. |
[4] | HUANG Jinchao,MA Yinghua,QI Kaiyue,LI Yichen,XIA Yuanyi. An Ensemble-Based Intrusion Detection Algorithm [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1382-1387. |
[5] | YUAN Song-Xiang, LIU Gong-Shen. Research of Ch-En Cross-Lingual Plagiarism Detection Based on Translation Features [J]. Journal of Shanghai Jiaotong University, 2012, 46(06): 989-993. |
[6] | ZHU Haodong. Research on Improvement and Simplification of ID3 Algorithm [J]. Journal of Shanghai Jiaotong University, 2010, 44(07): 883-0886. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 469
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 1571
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||