Sciweavers

1232 search results - page 59 / 247
» Evaluating role mining algorithms
Sort
View
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 8 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
TEC
2008
104views more  TEC 2008»
13 years 7 months ago
Genetic-Fuzzy Data Mining With Divide-and-Conquer Strategy
Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction data i...
Tzung-Pei Hong, Chun-Hao Chen, Yeong-Chyi Lee, Yu-...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 10 months ago
Mining emerging patterns by streaming feature selection
Building an accurate emerging pattern classifier with a highdimensional dataset is a challenging issue. The problem becomes even more difficult if the whole feature space is unava...
Kui Yu, Wei Ding 0003, Dan A. Simovici, Xindong Wu
DATAMINE
2002
155views more  DATAMINE 2002»
13 years 7 months ago
Efficient Adaptive-Support Association Rule Mining for Recommender Systems
Collaborative recommender systems allow personalization for e-commerce by exploiting similarities and dissimilarities among customers' preferences. We investigate the use of a...
Weiyang Lin, Sergio A. Alvarez, Carolina Ruiz
WWW
2004
ACM
14 years 8 months ago
On mining webclick streams for path traversal patterns
Mining user access patterns from a continuous stream of Web-clicks presents new challenges over traditional Web usage mining in a large static Web-click database. Modeling user ac...
Hua-Fu Li, Suh-Yin Lee, Man-Kwan Shan