Sciweavers

1231 search results - page 124 / 247
» Association Rules
Sort
View
SDM
2004
SIAM
271views Data Mining» more  SDM 2004»
13 years 11 months ago
A Foundational Approach to Mining Itemset Utilities from Databases
Most approaches to mining association rules implicitly consider the utilities of the itemsets to be equal. We assume that the utilities of itemsets may differ, and identify the hi...
Hong Yao, Howard J. Hamilton, Cory J. Butz
DSS
2007
226views more  DSS 2007»
13 years 10 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
CADE
2002
Springer
14 years 10 months ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula
SIGMOD
1989
ACM
118views Database» more  SIGMOD 1989»
14 years 2 months ago
The Architecture Of An Active Data Base Management System
The HiPAC project is investigating active, time-constrained databasemanagment. An active DBMS is one which automatically executes specified actions when speciifed conditions arise...
Dennis R. McCarthy, Umeshwar Dayal
PVLDB
2010
168views more  PVLDB 2010»
13 years 8 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...