Sciweavers

630 search results - page 26 / 126
» A Comparison of Two Approaches to Data Mining from Imbalance...
Sort
View
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 9 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
SACMAT
2010
ACM
14 years 28 days ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
PAKDD
2004
ACM
131views Data Mining» more  PAKDD 2004»
14 years 1 months ago
A Tree-Based Approach to the Discovery of Diagnostic Biomarkers for Ovarian Cancer
Computational diagnosis of cancer is a classification problem, and it has two special requirements on a learning algorithm: perfect accuracy and small number of features used in t...
Jinyan Li, Kotagiri Ramamohanarao
AUSDM
2006
Springer
93views Data Mining» more  AUSDM 2006»
14 years 10 days ago
Visualisation and Exploration of Scientific Data Using Graphs
Abstract. We present a prototype application for graph-based data exploration and mining, with particular emphasis on scientific data. The application has a Flash-based graphical i...
Ben Raymond, Lee Belbin
CEC
2007
IEEE
14 years 3 months ago
Repository method to suit different investment strategies
— This work is motivated by the interest in finding significant movements in financial stock prices. The detection of such movements is important because these could represent...
Alma Lilia Garcia-Almanza, Edward P. K. Tsang