Sciweavers

174 search results - page 18 / 35
» Implications of Probabilistic Data Modeling for Mining Assoc...
Sort
View
CIB
2002
100views more  CIB 2002»
13 years 6 months ago
Web-log Mining for Quantitative Temporal-Event Prediction
The web log data embed much of web users' browsing behavior. From the web logs, one can discover patterns that predict the users' future requests based on their current b...
Qiang Yang, Hui Wang, Wei Zhang
PAKDD
2007
ACM
121views Data Mining» more  PAKDD 2007»
14 years 26 days ago
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model
When companies seek for the combination of products which can constantly generate high profit, the association rule mining (ARM) or the utility mining will not achieve such task. ...
Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang
CAISE
2006
Springer
13 years 10 months ago
An Interactive, Asymmetric and Extensional Method for Matching Conceptual Hierarchies
Our work deals with schema or ontology matching and is driven by the following statements: (1) Most of works only consider intensional description of schemas; (2) They mostly use s...
Jérôme David, Fabrice Guillet, R&eacu...
CCS
2009
ACM
14 years 1 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
14 years 6 days ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...