Exploring New Methods for Protecting and Distributing Confidential Research Data.
Steve BurlingBryan BeecherPublished in: IASSIST Conference (2011)
Keyphrases
- original data
- data sets
- database
- data analysis
- data mining methods
- statistical methods
- significant improvement
- data points
- knowledge discovery
- high dimensional data
- multiple sources
- data mining techniques
- missing values
- data representations
- statistical tests
- data collection
- data processing
- image data
- computer systems
- attribute values
- spectral clustering
- data quality
- data sources
- preprocessing
- high quality
- numerical data
- training data