Search Results - "Houle, Michael"
-
1
On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study
Published in Data mining and knowledge discovery (01-07-2016)“…The evaluation of unsupervised outlier detection algorithms is a constant challenge in data mining research. Little is known regarding the strengths and…”
Get full text
Journal Article -
2
Rank-Based Similarity Search: Reducing the Dimensional Dependence
Published in IEEE transactions on pattern analysis and machine intelligence (01-01-2015)“…This paper introduces a data structure for k-NN search, the Rank Cover Tree (RCT), whose pruning tests rely solely on the comparison of similarity values;…”
Get full text
Journal Article -
3
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence
Published in IEEE transactions on information forensics and security (01-01-2021)“…Machine learning systems are vulnerable to adversarial attack. By applying to the input object a small, carefully-designed perturbation, a classifier can be…”
Get full text
Journal Article -
4
Expansion of the APC superfamily of secondary carriers
Published in Proteins, structure, function, and bioinformatics (01-10-2014)“…ABSTRACT The amino acid‐polyamine‐organoCation (APC) superfamily is the second largest superfamily of secondary carriers currently known. In this study, we…”
Get full text
Journal Article -
5
Local Intrinsic Dimensionality, Entropy and Statistical Divergences
Published in Entropy (Basel, Switzerland) (30-08-2022)“…Properties of data distributions can be assessed at both global and local scales. At a highly localized scale, a fundamental measure is the local intrinsic…”
Get full text
Journal Article -
6
Extreme-value-theoretic estimation of local intrinsic dimensionality
Published in Data mining and knowledge discovery (01-11-2018)“…This paper is concerned with the estimation of a local measure of intrinsic dimensionality (ID) recently proposed by Houle. The local model can be regarded as…”
Get full text
Journal Article -
7
Introduction to Special Issue of the 9th International Conference on Similarity Search and Applications (SISAP 2016)
Published in Information systems (Oxford) (01-02-2019)Get full text
Journal Article -
8
Identification of distant Agouti-like sequences and re-evaluation of the evolutionary history of the Agouti-related peptide (AgRP)
Published in PloS one (16-07-2012)“…The Agouti-like peptides including AgRP, ASIP and the teleost-specific A2 (ASIP2 and AgRP2) peptides have potent and diverse functional roles in feeding,…”
Get full text
Journal Article -
9
Efficient similarity search within user-specified projective subspaces
Published in Information systems (Oxford) (01-07-2016)“…Many applications — such as content-based image retrieval, subspace clustering, and feature selection — may benefit from efficient subspace similarity search…”
Get full text
Journal Article -
10
Density-preserving projections for large-scale local anomaly detection
Published in Knowledge and information systems (01-07-2012)“…Outlier or anomaly detection is a fundamental data mining task with the aim to identify data points, events, transactions which deviate from the norm. The…”
Get full text
Journal Article -
11
On the separability of quadrilaterals in the plane by translations and rotations
Published in Beiträge zur Algebra und Geometrie (01-06-2017)“…A proof is given that for all positive integers n ≥ 7 there exist sets of n non-overlapping quadrilaterals in the plane, such that no non-empty proper subset…”
Get full text
Journal Article -
12
A Non-hybrid Ant Colony Optimization Heuristic for Convergence Quality
Published in 2015 IEEE International Conference on Systems, Man, and Cybernetics (01-10-2015)“…Ant Colony Optimization has proven to be an important optimization technique. It has provided a solid base for solving classical computational problems,…”
Get full text
Conference Proceeding -
13
Effective and Efficient Algorithms for Flexible Aggregate Similarity Search in High Dimensional Spaces
Published in IEEE transactions on knowledge and data engineering (01-12-2015)“…Numerous applications in different fields, such as spatial databases, multimedia databases, data mining, and recommender systems, may benefit from efficient…”
Get full text
Journal Article -
14
Improving the quality of K-NN graphs through vector sparsification: application to image databases
Published in International journal of multimedia information retrieval (01-11-2014)“…K -nearest neighbor ( K -NN) graphs are an essential component of many established methods for content-based image retrieval and automated image annotation…”
Get full text
Journal Article -
15
Relationships between tail entropies and local intrinsic dimensionality and their use for estimation and feature representation
Published in Information systems (Oxford) (01-09-2023)“…The local intrinsic dimensionality (LID) model assesses the complexity of data within the vicinity of a query point, through the growth rate of the probability…”
Get full text
Journal Article -
16
Possible Warfarin Failure Due to Interaction with Smokeless Tobacco
Published in The Annals of pharmacotherapy (01-04-2004)“…OBJECTIVE To report a case of possible interaction of smokeless tobacco with warfarin in a patient treated after several thromboembolic events. CASE SUMMARY A…”
Get full text
Journal Article -
17
The Relevant-Set Correlation Model for Data Clustering
Published in Statistical analysis and data mining (25-11-2008)“…This paper introduces a model for clustering, the Relevant‐Set Correlation (RSC) model, that requires no direct knowledge of the nature or representation of…”
Get full text
Journal Article -
18
On local transformation of polygons with visibility properties
Published in Theoretical computer science (30-10-2002)“…One strategy for the enumeration of a class of objects is local transformation, in which new objects of the class are produced by means of a small modification…”
Get full text
Journal Article -
19
An efficient ant colony optimization strategy for the resolution of multi-class queries
Published in Knowledge-based systems (01-08-2016)“…•The AAF algorithm enhanced with entropic ant reassignment.•AAF applied to multi-class resource quieres in graphs.•Examining the feasibility of ACO-powered…”
Get full text
Journal Article -
20
Dimension-exchange algorithms for token distribution on tree-connected architectures
Published in Journal of parallel and distributed computing (01-05-2004)“…Load balancing on a multi-processor system involves redistributing tasks among processors so that each processor has roughly the same amount of work to…”
Get full text
Journal Article