Sciweavers

764 search results - page 37 / 153
» An Overview of Database Mining Techniques
Sort
View
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 8 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
ICDM
2002
IEEE
156views Data Mining» more  ICDM 2002»
14 years 29 days ago
Association Analysis with One Scan of Databases
Mining frequent patterns with an FP-tree avoids costly candidate generation and repeatedly occurrence frequency checking against the support threshold. It therefore achieves bette...
Hao Huang, Xindong Wu, Richard Relue
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
14 years 1 months ago
Discovering Frequent Arrangements of Temporal Intervals
In this paper we study a new problem in temporal pattern mining: discovering frequent arrangements of temporal intervals. We assume that the database consists of sequences of even...
Panagiotis Papapetrou, George Kollios, Stan Sclaro...
PVLDB
2008
93views more  PVLDB 2008»
13 years 7 months ago
Querying and mining of time series data: experimental comparison of representations and distance measures
The last decade has witnessed a tremendous growths of interests in applications that deal with querying and mining of time series data. Numerous representation methods for dimensi...
Hui Ding, Goce Trajcevski, Peter Scheuermann, Xiao...
DAWAK
2006
Springer
13 years 11 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro