Search alternatives:
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
61
-
62
TreeMap 2016 Stand Size Code Algorithm (Image Service)
Published 2024“…format=iso19139 "> ISO-19139 metadata</a></li><li> <a href="https://data-usfs.hub.arcgis.com/datasets/usfs::treemap-2016-stand-size-code-algorithm-image-service "> ArcGIS Hub Dataset</a></li><li> <a href="https://apps.fs.usda.gov/fsgisx01/rest/services/RDW_ForestEcology/TreeMap_2016_StandSizeCode_Algorithm/ImageServer "> ArcGIS GeoService</a></li></ul><div> For complete information, please visit <a href="https://data.gov">https://data.gov</a>.…”
-
63
-
64
QQESPM-GS - Codes and Data
Published 2025“…<p dir="ltr">Codes and Data for the algorithms, methods and experiments presented in the paper titled "QQESPM-GS: an Efficient Solution for Geo-textual Search Parameterized by Graph-based Spatial Patterns".…”
-
65
-
66
-
67
-
68
Code and data.
Published 2025“…We suggest that the metaphor of discrete echo chambers may be inappropriate for meta-opinions: while measures of meta-opinion accuracy and its influences can reveal echo chamber characteristics where other metrics confirm their presence, the presence or absence of meta-opinion clusters is not itself sufficient to define an echo chamber. We publish both data and analysis code as supplementary material.…”
-
69
-
70
-
71
-
72
-
73
-
74
-
75
-
76
-
77
RealBench: A Repo-Level Code Generation Benchmark Aligned with Real-World Software Development Practices
Published 2025“…<br><br><br></pre><p dir="ltr">This repository contains the implementation of **RealBench**, a comprehensive benchmark and evaluation framework for repository-level code aligned with real-world software development practices.…”
-
78
Results of association rule mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
79
Results of frequent itemset mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
80