Sciweavers

345 search results - page 33 / 69
» Detecting Connection-Chains: A Data Mining Approach
Sort
View
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 7 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 9 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
EDBT
2004
ACM
110views Database» more  EDBT 2004»
14 years 7 months ago
Using Convolution to Mine Obscure Periodic Patterns in One Pass
The mining of periodic patterns in time series databases is an interesting data mining problem that can be envisioned as a tool for forecasting and predicting the future behavior o...
Mohamed G. Elfeky, Walid G. Aref, Ahmed K. Elmagar...
SDM
2009
SIAM
202views Data Mining» more  SDM 2009»
14 years 4 months ago
Proximity-Based Anomaly Detection Using Sparse Structure Learning.
We consider the task of performing anomaly detection in highly noisy multivariate data. In many applications involving real-valued time-series data, such as physical sensor data a...
Tsuyoshi Idé, Aurelie C. Lozano, Naoki Abe,...
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
14 years 8 months ago
Detecting research topics via the correlation between graphs and texts
In this paper we address the problem of detecting topics in large-scale linked document collections. Recently, topic detection has become a very active area of research due to its...
Yookyung Jo, Carl Lagoze, C. Lee Giles