Sciweavers

764 search results - page 17 / 153
» An Overview of Database Mining Techniques
Sort
View
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
14 years 9 months ago
Go Green: Recycle and Reuse Frequent Patterns
In constrained data mining, users can specify constraints that can be used to prune the search space to avoid mining uninteresting knowledge. Since it is difficult to determine th...
Gao Cong, Beng Chin Ooi, Kian-Lee Tan, Anthony K. ...
HICSS
2005
IEEE
164views Biometrics» more  HICSS 2005»
14 years 1 months ago
An Efficient Technique for Frequent Pattern Mining in Real-Time Business Applications
Association rule mining in real-time is of increasing thrust in many business applications. Applications such as e-commerce, recommender systems, supply-chain management and group...
Rajanish Dass, Ambuj Mahanti
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
INFORMATICALT
2002
150views more  INFORMATICALT 2002»
13 years 7 months ago
Application of Data Mining Technique for Diagnosis of Posterior Uveal Melanoma
Application of knowledge discovery in databases (data mining) for medical decision support is discussed in this work. The aim of the study was to use decision support algorithm for...
Darius Jegelevicius, Arunas Lukosevicius, Alvydas ...
ISORC
2000
IEEE
14 years 10 days ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy