Sciweavers

1232 search results - page 42 / 247
» Evaluating role mining algorithms
Sort
View
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
13 years 9 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
ACL
2009
13 years 5 months ago
Mining Association Language Patterns for Negative Life Event Classification
Negative life events, such as death of a family member, argument with a spouse and loss of a job, play an important role in triggering depressive episodes. Therefore, it is worth ...
Liang-Chih Yu, Chien-Lung Chan, Chung-Hsien Wu, Ch...
ICMCS
2006
IEEE
344views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Pattern Mining in Visual Concept Streams
Pattern mining algorithms are often much easier applied than quantitatively assessed. In this paper we address the pattern evaluation problem by looking at both the capability of ...
Lexing Xie, Shih-Fu Chang
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
14 years 1 months ago
Online Hierarchical Clustering in a Data Warehouse Environment
Many important industrial applications rely on data mining methods to uncover patterns and trends in large data warehouse environments. Since a data warehouse is typically updated...
Elke Achtert, Christian Böhm, Hans-Peter Krie...
APNOMS
2008
Springer
13 years 9 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi