Sciweavers

1232 search results - page 41 / 247
» Evaluating role mining algorithms
Sort
View
KDD
1998
ACM
131views Data Mining» more  KDD 1998»
13 years 12 months ago
Interestingness-Based Interval Merger for Numeric Association Rules
We present an algorithm for mining association rules from relational tables containing numeric and categorical attributes. The approach is to merge adjacent intervals of numeric v...
Ke Wang, Soon Hock William Tay, Bing Liu
ICDM
2007
IEEE
119views Data Mining» more  ICDM 2007»
14 years 2 months ago
Reducing UK-Means to K-Means
This paper proposes an optimisation to the UK-means algorithm, which generalises the k-means algorithm to handle objects whose locations are uncertain. The location of each object...
Sau Dan Lee, Ben Kao, Reynold Cheng
DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 9 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
KDD
1998
ACM
106views Data Mining» more  KDD 1998»
13 years 12 months ago
Simultaneous Reliability Evaluation of Generality and Accuracy for Rule Discovery in Databases
This paper presents an algorithm for discovering conjunction rules with high reliability from data sets. The discovery of conjunction rules, each of which is a restricted form of ...
Einoshin Suzuki
DAWAK
2006
Springer
13 years 11 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro