Data dredging

Known as: Data dredge, Data snooping, P-hacking 
Data dredging (also data fishing, data snooping, and p-hacking) is the use of data mining to uncover patterns in data that can be presented as… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1970-2017
0204019702017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
  • 2017
Suppose there is a given data set and there are a huge number of hypotheses [1] about this data set [2]. If the data is totally… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted "cloud" server. In… (More)
Is this relevant?
2012
2012
As information technology (I.T.) is progressing rapidly day by day a massive amount of data is emerging at a fast rate in… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org… (More)
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We present Flush, a reliable, high goodput bulk data transport protocol for wireless sensor networks. Flush provides end-to-end… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • PETER R. HANSENa, ASGER LUNDEb
  • 2005
We compare 330 ARCH-type models in terms of their ability to describe the conditional variance. The models are compared out-of… (More)
  • table I
  • table II
  • table III
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We propose a new test for superior predictive ability. The new test compares favorably to the reality check (RC) for data… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present network intrusion detection (ID) mechanisms that rely upon packet snooping to detect aberrant behavior in mobile ad… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
This paper evaluates various explanations for the profitability of momentum strategies documented in Jegadeesh and Titman (1993… (More)
  • table IV
  • table IV
  • figure 3
  • table VI
  • table VII
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Existing memory models and cache consistency protocols assume the memory coherence property which requires that all processors… (More)
Is this relevant?