Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

KDD Cup 2001 report

Published: 01 January 2002 Publication History
  • Get Citation Alerts
  • Abstract

    This paper presents results and lessons from KDD Cup 2001. KDD Cup 2001 focused on mining biological databases. It involved three cutting-edge tasks related to drug design and genomics.

    References

    [1]
    Agrawal, R., Imielinski, T., and A. N. Swami. Mining association rules between sets of items in large databases. Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, D.C., May 26-28, 1993}, pages 207-216. ACM Press, 1993.]]
    [2]
    Cheng, J. (1998). PowerConstructor System. http://www.cs.ualberta.ca/~jcheng/bnpc.htm.]]
    [3]
    Cheng, J. (2000). PowerPredictor System. http://www.cs.ualberta.ca/~jcheng/bnpp.htm.]]
    [4]
    Cheng, J., Greiner, R. (1999). Comparing Bayesian network classifiers. In UAI-99.]]
    [5]
    Cheng, J. and Greiner, R., Learning Bayesian Belief Network Classifiers: Algorithms and System. Proceedings of 14th Biennial conference of the Canadian society for computational studies of intelligence, 2001.]]
    [6]
    Cheng, J. et al. (2001). Learning Bayesian networks from data: An information-theory based approach. To appear in Artificial Intelligence Journal.]]
    [7]
    Cooper, G. F. and Herskovits, E. (1992). A Bayesian Method for the induction of probabilistic networks from data. Machine Learning, 9 (pp. 309-347).]]
    [8]
    Freund, Y. and Schapire, R. E. A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 55(1):119-139, Aug. 1997.]]
    [9]
    Hand, D., Mannila, H. and Smyth, P. Principles of Data Mining. MIT Press, 2001.]]
    [10]
    Hanley, J. A. and McNeil B. J. (1982). The meaning and use of the area under a Receiver Operating Characteristic (ROC) curve. Radiology, 143, pp. 29-36.]]
    [11]
    Heckerman, D. (1995). A tutorial on learning Bayesian networks. Technical Report MSR-TR-95-06. Microsoft Research.]]
    [12]
    Joachims, T. Making Large-Scale SVM Learning Practical: In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning. MIT Press, 1999.]]
    [13]
    Krogel, M.-A. and Wrobel, S. Transformation-Based Learning Using Multirelational Aggregation. In C. Rouveirol and M. Sebag, editors, Proceedings of the Eleventh International Conference on Inductive Logic Programming (ILP), LNAI 2157. Springer-Verlag, 2001.]]
    [14]
    Morishita, S. Computing optimal hypotheses efficiently for boosting. Springer LNAI: Progresses in Discovery Science, in press.]]
    [15]
    Morishita, S. and Sese, J. Traversing itemset lattices with statistical metric pruning. Proc. of ACM SIGACT-SIGMOD-SIGART Symp. on Database Systems (PODS), pages 226-236, May 2000.]]
    [16]
    Neapolitan, R. E. (1990), Probabilistic reasoning in expert systems: theory and algorithms, John Wiley & Sons.]]
    [17]
    Pearl, J. (1988). Probabilistic Reasoning in Intelligent Systems: networks of plausible inference, Morgan Kaufmann.]]
    [18]
    Quinlan, J. R. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.]]
    [19]
    Spirtes, P., Glymour, C. and Scheines, R. (1993). Causation, Prediction,and Search. Springer Lecture Notes in Statistics.]]
    [20]
    Wrobel, S. Inductive Logic Progamming for Knowledge Discovery in Databases. In N. Lavrac and S. Dzeroski, editors, Relational Data Mining. Springer-Verlag, 2001.]]

    Cited By

    View all
    • (2023)Selecting Walk Schemes for Database EmbeddingProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3615052(1677-1686)Online publication date: 21-Oct-2023
    • (2023)Stable Tuple Embeddings for Dynamic Databases2023 IEEE 39th International Conference on Data Engineering (ICDE)10.1109/ICDE55515.2023.00103(1286-1299)Online publication date: Apr-2023
    • (2023)Deep Learning Bi-LSTM Model for Intrusion Detection in IoT2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)10.1109/ICAC3N60023.2023.10541673(1342-1347)Online publication date: 15-Dec-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGKDD Explorations Newsletter
    ACM SIGKDD Explorations Newsletter  Volume 3, Issue 2
    January 2002
    81 pages
    ISSN:1931-0145
    EISSN:1931-0153
    DOI:10.1145/507515
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 January 2002
    Published in SIGKDD Volume 3, Issue 2

    Check for updates

    Author Tags

    1. Competition
    2. biology
    3. drug design
    4. genomics

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Selecting Walk Schemes for Database EmbeddingProceedings of the 32nd ACM International Conference on Information and Knowledge Management10.1145/3583780.3615052(1677-1686)Online publication date: 21-Oct-2023
    • (2023)Stable Tuple Embeddings for Dynamic Databases2023 IEEE 39th International Conference on Data Engineering (ICDE)10.1109/ICDE55515.2023.00103(1286-1299)Online publication date: Apr-2023
    • (2023)Deep Learning Bi-LSTM Model for Intrusion Detection in IoT2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)10.1109/ICAC3N60023.2023.10541673(1342-1347)Online publication date: 15-Dec-2023
    • (2023)A new support vector machine for categorical featuresExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120449229:PAOnline publication date: 13-Jul-2023
    • (2022)Leva: Boosting Machine Learning Performance with Relational Embedding Data AugmentationProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517891(1504-1517)Online publication date: 10-Jun-2022
    • (2019)An evolutionary‐based approach for dealing with numerical and categorical attributes in ILPComputational Intelligence10.1111/coin.1221535:4(827-857)Online publication date: 20-May-2019
    • (2019)Using High-Fidelity Meta-Models to Improve Performance of Small Dataset Trained Bayesian NetworksExpert Systems with Applications10.1016/j.eswa.2019.112830(112830)Online publication date: Jul-2019
    • (2017)A generative model with hypergraph regularizers for protein function prediction2017 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN.2017.7966001(1289-1296)Online publication date: May-2017
    • (2017)On the use of stochastic local search techniques to revise first-order logic theories from examplesMachine Language10.1007/s10994-016-5595-3106:2(197-241)Online publication date: 1-Feb-2017
    • (2016)A Multi relational Framework for Knowledge Classification using Fuzzy Decision Tree in Biological SystemProceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society10.1145/2925995.2926026(1-8)Online publication date: 25-Jul-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media