Sciweavers

76 search results - page 7 / 16
» Analysis of Firewall Policy Rules Using Data Mining Techniqu...
Sort
View
HIPC
1999
Springer
13 years 11 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
14 years 7 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
JCP
2007
148views more  JCP 2007»
13 years 6 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
14 years 7 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi
KDD
2003
ACM
190views Data Mining» more  KDD 2003»
14 years 7 months ago
Distance-enhanced association rules for gene expression
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is the effective production of the protein that a gene encodes. We focus on the cha...
Aleksandar Icev, Carolina Ruiz, Elizabeth F. Ryder