Sciweavers

2988 search results - page 62 / 598
» Business applications of data mining
Sort
View
ICDE
2008
IEEE
136views Database» more  ICDE 2008»
14 years 10 months ago
T-Time: Threshold-Based Data Mining on Time Series
Mining time series data is an important approach for the analysis in many application areas as diverse as biology, environmental research, medicine, or stock chart analysis. As nea...
Alexey Pryakhin, Hans-Peter Kriegel, Johannes A&sz...
SDM
2007
SIAM
147views Data Mining» more  SDM 2007»
13 years 10 months ago
Constraint-Based Pattern Set Mining
Local pattern mining algorithms generate sets of patterns, which are typically not directly useful and have to be further processed before actual application or interpretation. Ra...
Luc De Raedt, Albrecht Zimmermann
ICAI
2009
13 years 6 months ago
Data Mining in Incomplete Numerical and Categorical Data Sets: A Neuro Fuzzy Approach
- There are many applications dealing with incomplete data sets that take different approaches to making imputations for missing values. Most tackle the problem for numerical input...
Pilar Rey del Castillo, Jesus Cardenosa
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 9 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
14 years 9 months ago
When do data mining results violate privacy?
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Murat Kantarcioglu, Jiashun Jin, Chris Clifton