Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,925,669 papers from all fields of science
Search
Sign In
Create Free Account
Data dredging
Known as:
Data dredge
, Data snooping
, P-hacking
Expand
Data dredging (also data fishing, data snooping, and p-hacking) is the use of data mining to uncover patterns in data that can be presented as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Correlation does not imply causation
Kitchen sink regression
Overfitting
Selection bias
Expand
Broader (2)
Data mining
Design of experiments
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Design and implementation of IoT testbed with three factor authentication
S. Sujatha
,
Y. U. Devi
International Conference on Communication and…
2016
Corpus ID: 35577103
Now-a-days, hackers are using many techniques to steal passwords such as shoulder surfing, guessing, snooping, sniffing, etc…
Expand
2016
2016
Honey Onions: Exposing Snooping Tor HSDir Relays
G. Noubir
,
Amirali Sanatinia
2016
Corpus ID: 46693725
Tor is a widely used anonymity network that protects users’ privacy and identity from corporations, agencies and governments…
Expand
2015
2015
Source Apportionment of Polycyclic Aromatic Hydrocarbons in Illinois River Sediment
K. Granberg
,
K. Rockne
2015
Corpus ID: 131291841
This research was funded by the Illinois Sustainable Technology Center (ISTC), a division of the Prairie Research Institute at…
Expand
2004
2004
Massenarbeitslosigkeit, Stress und der riskante Konsum von Alkohol
W. Puls
Journal of public health
2004
Corpus ID: 21381683
ZusammenfassungEinführungDer Zusammenhang zwischen Arbeitslosigkeit und riskantem Alkoholkonsum ist eine häufig untersuchte…
Expand
2004
2004
Caching support for push-pull data dissemination using data-snooping routers
Ismail Ari
,
E. L. Miller
Proceedings. Tenth International Conference on…
2004
Corpus ID: 1211131
Internet applications such as the HTTP-Web, audio-video streaming and file sharing depend on wide-area data dissemination…
Expand
2002
2002
Key snooping technology causes controversy
L. Paulson
Computer
2002
Corpus ID: 41645641
K ey-logging—a technique that lets users spy on other people by recording their keystrokes —is an old technology getting a lot of…
Expand
2002
2002
On the Tamability of the Location Consistency Memory Model
C. Wallace
,
G. Tremblay
,
J. N. Amaral
International Conference on Parallel and…
2002
Corpus ID: 7763723
Gao and Sarkar have proposed Location Consistency (LC), the weakest memory model described in the literature to date for shared…
Expand
2001
2001
Polynesian fishing implements from the wreck of HMS 'Pandora': A technological and contextual study
T. Fallowfield
2001
Corpus ID: 113861112
The story of Pandora's voyage and the ensuing archaeological investigation has been told by Peter Gesner in his report on the…
Expand
1996
1996
ROCK: the readout controller for the KLOE experiment
A. Aloisio
,
S. Cavaliere
,
+4 authors
P. Parascandolo
IEEE Transactions on Nuclear Science
1996
Corpus ID: 27089418
A read-out controller (ROCK) has been developed for the Data Acquisition System of the KLOE High Energy Physics experiment, based…
Expand
1976
1976
Deposition and Erosion in the Dredge Spoil and Other New York Bight Dumping Areas
G. Freeland
,
George F. Merril
1976
Corpus ID: 133630831
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE