A-Priori Algorithm, 194, 195, 201 Accessible Page, 169 Ad-Hoc Query

Total Page:16

File Type:pdf, Size:1020Kb

A-Priori Algorithm, 194, 195, 201 Accessible Page, 169 Ad-Hoc Query Index A-Priori Algorithm, 194, 195, 201 Bandwidth, 20 Accessible page, 169 Basket, see Market basket, 184, 186, Ad-hoc query, 116 187, 216 Adomavicius, G., 320 Bayes net, 4 Advertising, 16, 97, 186, 261 BDMO Algorithm, 251 Adwords, 270 Beer and diapers, 188 Afrati, F.N., 53 Bell, R., 321 Agglomerative clustering, see Hier- Bellkor’s Pragmatic Chaos, 290 archical clustering Berkhin, P., 182 Aggregation, 24, 31, 35 BFR Algorithm, 234, 237 Agrawal, R., 220 Bid, 271, 273, 280, 281 Alon, N., 144 BigTable, 53 Alon-Matias-Szegedy Algorithm, 128 Bik, A.J.C., 54 Amplification, 83 Biomarker, 187 Analytic query, 50 Bipartite graph, 267 AND-construction, 83 BIRCH Algorithm, 260 Anderson, C., 320 Birrell, A., 54 Andoni, A., 110 Bitmap, 202 Apache, 22, 54 Block, 11, 19, 162 Archive, 114 Blog, 170 Ask, 174 Bloom filter, 122, 200 Association rule, 187, 189 Bloom, B.H., 144 Associativity, 25 Bohannon, P., 53 Attribute, 29 Bonferroni correction, 5 Auction, 273 Bonferroni’s principle, 4, 5 Austern, M.H., 54 Bookmark, 168 Authority, 174 Borkar, V., 53 Average, 126 Bradley, P.S., 260 Brick-and-mortar retailer, 186, 288, B-tree, 260 289 Babcock, B., 144, 260 Brin, S., 182 Babu, S., 144 Broad matching, 273 Bag, 37, 59 Broder, A.Z., 18, 110, 182 Balance Algorithm, 273 Bu, Y., 53 Balazinska, M., 53 Bucket, 9, 119, 134, 138, 200, 251 Band, 70 Budget, 272, 279 321 322 INDEX Budiu, M., 54 Cosine distance, 76, 86, 293, 298 Burrows, M., 53 Counting ones, 132, 251 Craig’s List, 262 Candidate itemset, 197, 210 Craswell, N., 285 Candidate pair, 70, 201, 203 CURE Algorithm, 242, 246 Carey, M., 53 Currey, J., 54 Centroid, 223, 226, 232, 235, 239 Curse of dimensionality, 224, 248 Chabbert, M., 320 Cyclic permutation, 68 Chandra, T., 53 Cylinder, 12 Chang, F., 53 Czajkowski, G., 54 Characteristic matrix, 62 Charikar, M.S., 110 Darts, 122 Chaudhuri, S., 110 Data mining, 1 Checkpoint, 43 Data stream, 16, 214, 250, 264 Chen, M.-S., 220 Data-stream-management system, 114 Cholera, 3 Database, 16 Chronicle data model, 143 Datar, M., 111, 144, 260 Chunk, 21, 210, 238 Datar-Gionis-Indyk-Motwani Algo- CineMatch, 317 rithm, 133 Classifier, 298 Dead end, 149, 152, 153, 175 Click stream, 115 Dean, J., 53 Click-through rate, 265, 271 Decaying window, 139, 215 Cloud computing, 15 Decision tree, 298 CloudStore, 22 Dehnert, J.C., 54 Cluster computing, 20 del.icio.us, 294 Cluster tree, 246, 247 Deletion, 77 Clustera, 38, 52 Dense matrix, 28 Clustering, 3, 16, 221, 305 Density, 231, 233 Clustroid, 226, 232 DeWitt, D.J., 54 Collaborative filtering, 4, 17, 57, 261, DFS, see Distributed file system 287, 301 Diameter, 231, 233 Combiner, 25, 159, 161 Diapers and beer, 186 Communication cost, 44 Difference, 30, 33, 38 Commutativity, 25 Dimension table, 50 Competitive ratio, 16, 266, 269, 274 Dimensionality reduction, 308 Compressed set, 238 Discard set, 238 Compute node, 20 Disk, 11, 191, 223, 246 Computer game, 295 Disk block, see Block Computing cloud, see Cloud com- Display ad, 262, 263 puting Distance measure, 74, 221 Confidence, 187, 189 Distinct elements, 124, 127 Content-based recommendation, 287, Distributed file system, 21, 184, 191 292 DMOZ, see Open directory Cooper, B.F., 53 Document, 56, 59, 187, 222, 281, Coordinates, 222 293, 294 INDEX 323 Document frequency, see Inverse doc- Frequent bucket, 200, 202 ument frequency Frequent itemset, 4, 184, 194, 197 Domain, 172 Frequent pairs, 194, 195 Dot product, 76 Frequent-items table, 196 Dryad, 52 Friends relation, 48 DryadLINQ, 53 Frieze, A.M., 110 Dup-elim task, 40 Gaber, M.M., 18 e, 12 Ganti, V., 110, 260 Edit distance, 77, 80 Garcia-Molina, H., 18, 182, 220, 260 Eigenvalue, 149 Garofalakis, M., 144 Eigenvector, 149 Gaussian elimination, 150 Elapsed communication cost, 46 Gehrke, J., 144, 260 Ensemble, 299 Genre, 292, 304, 318 Entity resolution, 91, 92 GFS, see Google file system Equijoin, 30 Ghemawat, S., 53, 54 Erlingsson, I., 54 Gibbons, P.B., 144 Ernst, M., 53 Gionis, A., 111, 144 Ethernet, 20 Global minimum, 310 Euclidean distance, 74, 89 Gobioff, H., 54 Euclidean space, 74, 78, 222, 223, Google, 146, 157, 270 226, 242 Google file system, 22 Exponentially decaying window, see Graph, 42 Decaying window Greedy algorithm, 264, 265, 268, 272 GRGPF Algorithm, 246 Facebook, 168 Grouping, 24, 31, 35 Fact table, 50 Grouping attribute, 31 Failure, 20, 26, 39, 40, 42 Gruber, R.E., 53 False negative, 70, 80, 209 Guha, S., 260 False positive, 70, 80, 122, 209 Gunda, P.K., 54 Family of functions, 81 Gyongi, Z., 182 Fang, M., 220 Fayyad, U.M., 260 Hadoop, 25, 54 Feature, 246, 292–294 Hadoop distributed file system, 22 Fetterly, D., 54 Hamming distance, 78, 86 Fikes, A., 53 Harris, M., 317 File, 20, 21, 191, 209 Hash function, 9, 60, 65, 70, 119, Filtering, 121 122, 125 Fingerprint, 94 Hash key, 9, 280 First-price auction, 273 Hash table, 9, 10, 12, 193, 200, 202, Fixedpoint, 84, 174 204, 280, 282 Flajolet, P., 144 Haveliwala, T.H., 182 Flajolet-Martin Algorithm, 125 HDFS, see Hadoop distributed file Flow graph, 38 system French, J.C., 260 Henzinger, M., 111 324 INDEX Hierarchical clustering, 223, 225, 243, Jahrer, M., 321 306 Join, see Natural join, see Multiway HITS, 174 join, see Star join Hive, 53, 54 Join task, 40 Horn, H., 54 Howe, B., 53 K-means, 234 Hsieh, W.C., 53 Kalyanasundaram, B., 286 Hub, 174 Kamm, D., 317 Hyperlink-induced topic search, see Karlin, A., 266 HITS Kaushik, R., 110 Hyracks, 38 Kautz, W.H., 144 Key component, 119 Identical documents, 99 Key-value pair, 22–24 IDF, see Inverse document frequency Keyword, 271, 299 Image, 115, 293, 294 Kleinberg, J.M., 182 IMDB, see Internet Movie Database Knuth, D.E., 18 Imielinski, T., 220 Koren, Y., 320 Immediate subset, 212 Kosmix, 22 Immorlica, N., 111 Krioukov, A., 54 Important page, 146 Kumar, R., 18, 54, 182 Impression, 262 Kumar, V., 18 In-component, 151 Inaccessible page, 169 Lagrangean multipliers, 48 Index, 10 LCS, see Longest common subse- Indyk, P., 110, 111, 144 quence Initialize clusters, 235 Leiser, N, 54 Insertion, 77 Length, 128 Interest, 188 Length indexing, 100 Internet Movie Database, 292, 317 Leung, S.-T., 54 Intersection, 30, 33, 38 Lin, S., 111 Into Thin Air, 291 Linden, G., 320 Inverse document frequency, see TF.IDF, Linear equations, 150 8 Link, 29, 146, 160 Inverted index, 146, 262 Link matrix of the Web, 175 IP packet, 115 Link spam, 165, 169 Isard, M., 54 Livny, M., 260 Isolated component, 152 Local minimum, 310 Item, 184, 186, 187, 288, 304, 305 Locality-sensitive family, 86 Item profile, 292, 295 Locality-sensitive function, 81 Itemset, 184, 192, 194 Locality-sensitive hashing, 69, 80, 294 Jaccard distance, 74, 75, 82, 293 Logarithm, 12 Jaccard similarity, 56, 64, 74, 169 Long tail, 186, 288, 289 Jacobsen, H.-A., 53 Longest common subsequence, 77 Jagadish, H.V., 144 LSH, see Locality-sensitive hashing INDEX 325 Machine learning, 2, 298 Motwani, R., 111, 144, 220, 260 Maghoul, F., 18, 182 Mulihash Algorithm, 204 Mahalanobis distance, 241 Multiplication, 27, 35, 36, 159, 174 Main memory, 191, 192, 200, 223 Multiset, see Bag Malewicz, G, 54 Multistage Algorithm, 202 Manber, U., 111 Multiway join, 46 Manhattan distance, 75 Mumick, I.S., 144 Manning, C.P., 18 Mutation, 80 Many-many matching, 95 Many-many relationship, 184 Name node, see Master node Many-one matching, 95 Natural join, 30, 34, 35, 45 Map task, 22, 23, 25 Naughton, J.F., 54 Map worker, 25, 27 Navathe, S.B., 220 Map-reduce, 15, 19, 22, 27, 159, 161, Near-neighbor search, see locality- 210, 255 sensitive hashing Market basket, 4, 16, 183, 184, 191 Negative border, 212 Markov process, 149, 152 Netflix challenge, 2, 290, 317 Martin, G.N., 144 Newspaper articles, 97, 281, 290 Master controller, 22, 24, 25 Non-Euclidean distance, 232, see Co- Master node, 22 sine distance, see Edit dis- Matching, 267 tance, see Hamming dis- Matias, Y., 144 tance, see Jaccard distance Matrix, 27, 35, 36, see Transition Non-Euclidean space, 246, 248 matrix of the Web, see Stochas- Norm, 74, 75 tic matrix, see Substochas- Normal distribution, 237 tic matrix, 159, 174, see Normalization, 301, 303, 314 Utility matrix, 308 Matthew effect, 14 O’Callaghan, L., 260 Maximal itemset, 194 Off-line algorithm, 264 Maximal matching, 267 Olston, C., 54 Mean, see Average Omiecinski, E., 220 Median, 126 On-line advertising, see Advertising Mehta, A., 286 On-line algorithm, 16, 264 Merging clusters, 226, 229, 240, 244, On-line retailer, 186, 262, 288, 289 249, 253 Open Directory, 166 Merton, P., 18 OR-construction, 83 Minhashing, 63, 72, 76, 82, 294 Orthogonal vectors, 224 Minicluster, 238 Out-component, 151 Minutiae, 94 Outlier, 223 Mirrokni, V.S., 111 Overfitting, 299 Mirror page, 57 Overture, 271 Mitzenmacher, M., 110 Own pages, 170 Moments, 127 Monotonicity, 194 Paepcke, A., 111 Most-common elements, 139 Page, L., 145, 182 326 INDEX PageRank, 3, 16, 27, 29, 40, 145, Randomization, 208 147, 159 Rarest-first order, 281 Pairs, see Frequent pairs Rastogi, R., 144, 260 Park, J.S., 220 Rating, 288, 291 Pass, 192, 195, 202, 208 Recommendation system, 16, 287 Paulson, E., 54 Recursion, 40 PCY Algorithm, 200, 202, 203 Reduce task, 22, 24 Pedersen, J., 182 Reduce worker, 25, 27 Perfect matching, 267 Reed, B., 54 Permutation, 63, 68 Reina, C., 260 PIG, 53 Relation, 29 Piotte, M., 320 Relational algebra, 29, 30 Plagiarism, 57, 187 Replication, 21 Pnuts, 53 Representation, 247 Point, 221, 251 Representative point, 243 Point assignment, 223, 234 Representative sample, 119 Polyzotis, A., 53 Reservoir sampling, 144 Position indexing, 102, 104 Retained set, 238 Positive integer, 138 Revenue, 272 Powell, A.L., 260 Ripple-carry adder, 138 Power law, 13 RMSE,
Recommended publications
  • A Survey of Hierarchical Clustering Algorithms the Journal Of
    M. Kuchaki Rafsanjani, Z. Asghari Varzaneh, N. Emami Chukanlo / TJMCS Vol .5 No.3 (2012) 229-240 The Journal of Mathematics and Computer Science Available online at http://www.TJMCS.com The Journal of Mathematics and Computer Science Vol .5 No.3 (2012) 229-240 A survey of hierarchical clustering algorithms Marjan Kuchaki Rafsanjani Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran [email protected] Zahra Asghari Varzaneh Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran [email protected] Nasibeh Emami Chukanlo Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran [email protected] Received: November 2012, Revised: December 2012 Online Publication: December 2012 Abstract Clustering algorithms classify data points into meaningful groups based on their similarity to exploit useful information from data points. They can be divided into categories: Sequential algorithms, Hierarchical clustering algorithms, Clustering algorithms based on cost function optimization and others. In this paper, we discuss some hierarchical clustering algorithms and their attributes, and then compare them with each other. Keywords: Clustering; Hierarchical clustering algorithms; Complexity. 2010 Mathematics Subject Classification: Primary 91C20; Secondary 62D05. 1. Introduction. Clustering is the unsupervised classification of data into groups/clusters [1]. It is widely used in biological and medical applications, computer vision, robotics, geographical data, and so on [2]. To date, many clustering algorithms have been developed. They can organize a data set into a number of groups /clusters. Clustering algorithms may be divided into the following major categories: Sequential algorithms, Hierarchical clustering algorithms, Clustering algorithms based on cost function optimization and etc [3].
    [Show full text]
  • The CURE for Class Imbalance
    The CURE for Class Imbalance B Colin Bellinger1( ), Paula Branco2, and Luis Torgo2 1 National Research Council of Canada, Ottawa, Canada [email protected] 2 Dalhousie University, Halifax, Canada {pbranco,ltorgo}@dal.ca Abstract. Addressing the class imbalance problem is critical for sev- eral real world applications. The application of pre-processing methods is a popular way of dealing with this problem. These solutions increase the rare class examples and/or decrease the normal class cases. However, these procedures typically only take into account the characteristics of each individual class. This segmented view of the data can have a nega- tive impact. We propose a new method that uses an integrated view of the data classes to generate new examples and remove cases. ClUstered REsampling (CURE) is a method based on a holistic view of the data that uses hierarchical clustering and a new distance measure to guide the sampling procedure. Clusters generated in this way take into account the structure of the data. This enables CURE to avoid common mistakes made by other resampling methods. In particular, CURE prevents the generation of synthetic examples in dangerous regions and undersamples safe, non-borderline, regions of the majority class. We show the effec- tiveness of CURE in an extensive set of experiments with benchmark domains. We also show that CURE is a user-friendly method that does not require extensive fine-tuning of hyper-parameters. Keywords: Imbalanced domains · Resampling · Clustering 1 Introduction Class imbalance is a problem encountered in a wide variety of important clas- sification tasks including oil spill, fraud detection, action recognition, text clas- sification, radiation monitoring and wildfire prediction [4,17,21,22,24,27].
    [Show full text]
  • An Improved CURE Algorithm Mingjuan Cai, Yongquan Liang
    An Improved CURE Algorithm Mingjuan Cai, Yongquan Liang To cite this version: Mingjuan Cai, Yongquan Liang. An Improved CURE Algorithm. 2nd International Conference on Intelligence Science (ICIS), Nov 2018, Beijing, China. pp.102-111, 10.1007/978-3-030-01313-4_11. hal-02118834 HAL Id: hal-02118834 https://hal.inria.fr/hal-02118834 Submitted on 3 May 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License An improved CURE algorithm Mingjuan Cai 1, Yongquan Liang 2 1College of Computer Science and Engineering and Shandong Province Key Laboratory of Wisdom Mine Information Technology, Shandong University of Science and Technology, Qingdao 266590, China 2College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China [email protected] ABSTRACT. CURE algorithm is an efficient hierarchical clustering algorithm for large data sets. This paper presents an improved CURE algorithm, named ISE-RS-CURE. The algorithm adopts a sample extraction algorithm combined with statistical ideas, which can reasonably select sample points according to different data densities and can improve the representation of sample sets. When the sample set is extracted, the data set is divided at the same time, which can help to reduce the time consumption in the non-sample set allocation process.
    [Show full text]
  • Dynamic Group Recommendation Based on the Attention Mechanism
    future internet Article Dynamic Group Recommendation Based on the Attention Mechanism Haiyan Xu , Yanhui Ding *, Jing Sun, Kun Zhao and Yuanjian Chen School of Information Science and Engineering, Shandong Normal University, Jinan 250358, China; [email protected] (H.X.); [email protected] (J.S.); [email protected] (K.Z.); [email protected] (Y.C.) * Correspondence: [email protected]; Tel.: +86-139-0531-6824 Received: 29 July 2019; Accepted: 16 September 2019; Published: 17 September 2019 Abstract: Group recommendation has attracted significant research efforts for its importance in benefiting group members. The purpose of group recommendation is to provide recommendations to group users, such as recommending a movie to several friends. Group recommendation requires that the recommendation should be as satisfactory as possible to each member of the group. Due to the lack of weighting of users in different items, group decision-making cannot be made dynamically. Therefore, in this paper, a dynamic recommendation method based on the attention mechanism is proposed. Firstly, an improved density peak clustering (DPC) algorithm is used to discover the potential group; and then the attention mechanism is adopted to learn the influence weight of each user. The normalized discounted cumulative gain (NDCG) and hit ratio (HR) are adopted to evaluate the validity of the recommendation results. Experimental results on the CAMRa2011 dataset show that our method is effective. Keywords: group recommendation; density peak clustering; attention mechanism 1. Introduction With the rapid development of information technology, the recommendation system has become an important tool for people to solve information overload issues. The recommendation system has been widely used in many online information systems, such as social media sites, E-commerce platforms, etc., to help users choose products [1–3] that meet their needs.
    [Show full text]
  • An Improvement for DBSCAN Algorithm for Best Results in Varied Densities
    Computer Engineering Department Faculty of Engineering Deanery of Higher Studies The Islamic University-Gaza Palestine An Improvement for DBSCAN Algorithm for Best Results in Varied Densities Mohammad N. T. Elbatta Supervisor Dr. Wesam M. Ashour A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Engineering Gaza, Palestine (September, 2012) 1433 H ii stnkmegnelnonkcA Apart from the efforts of myself, the success of any project depends largely on the encouragement and guidelines of many others. I take this opportunity to express my gratitude to the people who have been instrumental in the successful completion of this project. I would like to thank my parents for providing me with the opportunity to be where I am. Without them, none of this would be even possible to do. You have always been around supporting and encouraging me and I appreciate that. I would also like to thank my brothers and sisters for their encouragement, input and constructive criticism which are really priceless. Also, special thanks goes to Dr. Homam Feqawi who did not spare any effort to review and audit my thesis linguistically. My heartiest gratitude to my wonderful wife, Nehal, for her patience and forbearance through my studying and preparing this study. I would like to express my sincere gratitude to my advisor Dr. Wesam Ashour for the continuous support of my master study and research, for his patience, motivation, enthusiasm, and immense knowledge. His guidance helped me in all the time of research and writing of this thesis. I could not have imagined having a better advisor and mentor for my master study.
    [Show full text]
  • Download (PDF)
    DX.Y “TITLE OF THE DELIVERABLE” Ref. Ares(2021)1046119 - 06/02/2021 Version 1.0 Document Information Contract Number 780681 Project Website https://legato-project.eu/ Contractual Deadline Dissemination Level D4.4 “REPORT ON ENERGY-EFFICIENCY EVALUATIONS AND OPTIMIZATIONS FOR ENERGY-EFFICIENT, SECURE, Nature RESILIENT TASK-BASED PROGRAMMING MODEL AND COMPILER EXTENSIONS” Author DX.Y “TITLEVersion 2 OF THE DELIVERABLE” Contributors Document Information Version 1.0 Reviewers Contract Number 780681 Project Website https://legato-project.eu/ Contractual Deadline 30 November 2020 Dissemination Level Public Document InformationNature Report Author Marcelo Pasin (UNINE) Contributors Isabelly Rocha (UNINE), Christian Göttel (UNINE), Valerio The LEGaTO project has receivedSchiavoni (UNINE), Pascal Felber (UNINE), Gabriel Fernandez funding from the European Union’s Horizon 2020 (TUD), Xavier Martorell (BSC), Leonardo Bautista-Gomez (BSC), research and innovationMustafa Abduljabbar (CHALMERS), Oron Port (TECHNION), programme under the Grant Agreement No 780681 Contract Number 780681Tobias Becker (MAXELER), Alexander Cramb (MAXELER) Reviewers Madhavan Manivannan (CHALMERS), Daniel Ödman (MIS), Elaheh Malekzadeh (MIS), Chistian von Schultz (MIS), Hans Salomonsson (MIS) Project Website https://legato-project.eu/ The LEGaTO project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Grant Agreement No 780681. Contractual Deadline DX.Y Version 1.0 1 / 4 D4.4 Version 2 1/ 62 Dissemination Level Nature
    [Show full text]
  • Hierarchical Clustering Algorithm for Big Data Using Hadoop and Mapreduce
    Hierarchical Clustering Algorithm for Big Data using Hadoop and Mapreduce Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Software Engineering Submitted By Piyush Lathiya (801431011) Under the supervision of: Dr. Rinkle Rani Associate Professor COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA – 147004 June 2016 i ii Abstract Mining of massive data sets is the need of the hour in present computer science industry. The exponential growth in the number of users on internet and volume of available data force research to think about efficient approach to store data and analyze useful patterns out of it. Extracting useful information out of massive data and process them in less span of time has become crucial part of Data mining. There are many approach exist to cluster data objects based on similarity. CURE (Clustering Using Representatives) is very useful hierarchical algorithm which has ability to identify cluster of arbitrary shape and able to identify outliers. However traditional CURE algorithm is based on processing in single machine hence can’t cluster large amount of data in efficient way. In this thesis, CURE algorithm is proposed along with Distributed Environment using Hadoop. To process huge amount of data and to extract useful patterns out of it, distributed environment is the efficient solution so clustering of data objects is performed with the help of Mapreduce Programming model. One of the other advantage of CURE algorithm is to detect outlier points and removed it from further clustering process and improve quality of clusters. The major focus of this thesis has been exploring new approach to cluster data objects using CURE clustering algorithm with the help of Hadoop distributed environment and explore effect of different parameters in outlier detection.
    [Show full text]
  • Statistical Modeling Machine Learning
    資料偵探的倚天劍 —資管人如何處理大數據與 AI 課題 Yihuang Kang Data-Driven Discovery (D3) Lab @ NSYSU 1 Instructor • Yihuang K. Kang (康藝晃), PhD. 為中山大學 資訊管理學系助理教授。曾任美國匹茲堡大 學醫學中心資深程式設計師與分析師。專長 為統計機器學習、整合分析平台導入、電子 化健康醫療數據分析、與遠距醫療系統開發。 • • 近年回台任中山大學資訊管理學系助理教授,協助中山大學建 置整合數據分析平台,並結合專長教授數據分析與機器學習相 關課程。為中山大學智慧電子商務研究中心與跨領域及數據科 學研究中心成員。資策會教育訓練(機器學習)講師。已有多項 研究發表於頂尖的資料探勘與健康醫療研究期刊。擁有多個實 務資訊系統管理、程式設計、與商業分析專業認證。 2 Outline • Brief Introduction to Data Science • Fundamental of Data Analytics • Programming vs. Machine Learning • Towards Interpretable AI • From Business Intelligence to Unified Analytics • Build Our Data (Dream) Team! 3 What is "Data Science" • “Data science is a multidisciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from data in various forms, both structured and unstructured.” Drew Conway’s Venn diagram of data science 4 A Brief History of Data Science 5 6 The Rise of Data Science 7 The Rise of "Data Scientists" “Data Scientist is The Sexiest Job of the 21st Century” —T. Davenport & D.J. Patil, Harvard Business Review Source: http://www.techjuice.pk/how-to-become-a-data-scientist-for-free/ 8 The "Dilemma" of the Data Scientists Source: http://www.kdnuggets.com/2016/08/cartoon-data-scientist-sexiest-job-21st-century.html 9 “Data” Careers Data Data Data Data Manager Analyst Engineer Scientist Business Acumen Data Management Math Programming Statistics 10 Big Data • According to a report from International Data Corporation (IDC), in 2011, the overall created and copied data volume in the world was 1.8ZB, which increased by nearly 9 times within five years. By 2020, it’s estimated 35ZB. • Challenges: big data management and analysis Sources: Big Data: A Survey 11 What is "Big Data" • Many people have defined "Big Data" with 3Vs, 4Vs, 5Vs…, many Vs! • My definition is: "Too much and complicated data to be processed by a single machine with reasonable time or resources".
    [Show full text]
  • Intel® Xeon® Processors Projector
    Intel Korea Sep 2017 © 2016 Altair Engineering, Inc. Proprietary and Confidential. All rights reserved. Legal Notices & disclaimers This document contains information on products, services and/or processes in development. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest forecast, schedule, specifications and roadmaps. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Learn more at intel.com, or from the OEM or retailer. No computer system can be absolutely secure. Tests document performance of components on a particular test, in specific systems. Differences in hardware, software, or configuration will affect actual performance. Consult other sources of information to evaluate performance as you consider your purchase. For more complete information about performance and benchmark results, visit http://www.intel.com/performance. Cost reduction scenarios described are intended as examples of how a given Intel-based product, in the specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances will vary. Intel does not guarantee any costs or cost reduction. Statements in this document that refer to Intel’s plans and expectations for the quarter, the year, and the future, are forward-looking statements that involve a number of risks and uncertainties. A detailed discussion of the factors that could affect Intel’s results and plans is included in Intel’s SEC filings, including the annual report on Form 10-K. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications.
    [Show full text]
  • Privacy-Preserving Clustering Using Representatives Over Arbitrarily Partitioned Data∗
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 9, 2013 Privacy-Preserving Clustering Using Representatives over Arbitrarily Partitioned Data∗ Yu Li, Sheng Zhong Computer Science and Engineering Department State University of New York at Buffalo Amherst, NY 14260, U.S.A Email: fyli32,[email protected] Abstract—The challenge in privacy-preserving data mining is targeted marketing, people are more willing to communicate avoiding the invasion of personal data privacy. Secure computa- with others who share the same interests, they are cautious tion provides a solution to this problem. With the development of about revealing their private information to the public. Privacy- this technique, fully homomorphic encryption has been realized preserving data mining is the only way to solve this problem after decades of research; this encryption enables the computing and to not invade the privacy of customers. Another example and obtaining results via encrypted data without accessing any is in the bioinformatics field when two medical researchers plaintext or private key information. In this paper, we propose a privacy-preserving clustering using representatives (CURE) want to study a certain disease caused by a gene. They cannot algorithm over arbitrarily partitioned data using fully homomor- share these data with each other due to the privacy rules phic encryption. Our privacy-preserving CURE algorithm allows established by HIPAA. But privacy-preserving data mining cooperative computation without revealing users’ individual data. using homomorphic encryption can determine the relationship The method used in our algorithm enables the data to be between these data without revealing any information to the arbitrarily distributed among different parties and to receive other concerned parties.
    [Show full text]
  • Robust Clustering Algorithms
    ROBUST CLUSTERING ALGORITHMS A Thesis Presented to The Academic Faculty by Pramod Gupta In Partial Fulfillment of the Requirements for the Degree Masters in Computer Science in the School of Computer Science Georgia Institute of Technology May 2011 Copyright © 2011 by Pramod Gupta ROBUST CLUSTERING ALGORITHMS Approved by: Prof. Maria-Florina Balcan, Advisor School of Computer Science Georgia Institute of Technology Prof. Santosh Vempala School of Computer Science Georgia Institute of Technology Prof. Alexander Gray School of Computer Science Georgia Institute of Technology Date Approved: March, 29, 2011 ACKNOWLEDGEMENTS This thesis would not have been possible without the guidance and the help of several individuals who in one way or another contributed and extended their valuable assistance in the preparation and completion of this work. First and foremost, my utmost gratitude to Prof. Nina Balcan, whose encouragement, guidance and support from the initial to the final level enabled me to develop an understand- ing of the subject. She has been an immense inspiration and I thank her for her patience, motivation, enthusiasm, immense knowledge and steadfast encouragement as I hurdle all the obstacles in the completion this work. I would like to thank the rest of my thesis committee: Prof. Santosh Vempala and Prof. Alex Gray for their encouragement and insightful comments throughout the course of this work. I am extremely grateful to Prof. Dana Randall, an insightful and amazing teacher, who helped me better understand the theoretical thought process. The Algorithms & Randomness Center, that allowed us to use their machines to run our experiments. James Kriigel at the Technology Services Organization, College of Computing, for his help in setting us up with the necessary technical resources.
    [Show full text]
  • Large Scale Clustering
    Clustering at Large Scales Veronika Strnadová CSC Lab What is clustering? Finding groups of highly similar objects in unlabeled datasets or: Finding groups of highly connected vertices in a graph 퐶1 퐶2 cluster 퐶3 Applications • Image Segmentation • Normalized Cuts and Image Segmentation. Jianbo Shi and Jitendra Malik, 2001 • Load Balancing in Parallel Computing • Multilevel k-way Partitioning Scheme for Irregular Graphs. George Karypis and Vipin Kumar. 1998 • Genetic Mapping 퐿퐺1 퐿퐺2 • Computational approaches and software tools for genetic linkage map estimation in plants. Jitendra Cheema and Jo Dicks. 2009 • Community Detection • Modularity and community structure in networks. Mark E.J. Newman. 2006 Clustering in Genetic Mapping “The problem of genetic mapping can essentially be divided into three parts: grouping, ordering, and spacing” Computational approaches and software tools for genetic linkage map estimation in plants. Cheema 2009 Challenges in the large scale setting Big Data: Many popular clustering algorithms are inherently difficult to parallelize, and inefficient at large scales Challenges in the large scale setting Big Data: Many popular clustering algorithms are inherently difficult to parallelize, and inefficient at large scales “The computational issue becomes critical when the application involves large-scale data” Jain, Data Clustering: 50 Years Beyond 푘-means Challenges in the large scale setting Big Data: Many popular clustering algorithms are inherently difficult to parallelize, and inefficient at large scales “The
    [Show full text]