Sciweavers

630 search results - page 30 / 126
» A Comparison of Two Approaches to Data Mining from Imbalance...
Sort
View
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
14 years 2 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 2 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
TKDE
2002
148views more  TKDE 2002»
13 years 8 months ago
Parallel Star Join + DataIndexes: Efficient Query Processing in Data Warehouses and OLAP
On-Line Analytical Processing (OLAP) refers to the technologies that allow users to efficiently retrieve data from the data warehouse for decision-support purposes. Data warehouses...
Anindya Datta, Debra E. VanderMeer, Krithi Ramamri...
COSIT
2003
Springer
145views GIS» more  COSIT 2003»
14 years 1 months ago
Extracting Landmarks with Data Mining Methods
Abstract. The navigation task is a very demanding application for mobile users. The algorithms of present software solutions are based on the established methods of car navigation ...
Birgit Elias
ENGL
2007
180views more  ENGL 2007»
13 years 8 months ago
Biological Data Mining for Genomic Clustering Using Unsupervised Neural Learning
— The paper aims at designing a scheme for automatic identification of a species from its genome sequence. A set of 64 three-tuple keywords is first generated using the four type...
Shreyas Sen, Seetharam Narasimhan, Amit Konar