Sciweavers

718 search results - page 116 / 144
» Mining exception-handling rules as sequence association rule...
Sort
View
FUIN
2000
109views more  FUIN 2000»
13 years 7 months ago
Building Knowledge Scouts Using KGL Metalanguage
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...
Ryszard S. Michalski, Kenneth A. Kaufman
ICCS
2007
Springer
14 years 1 months ago
Characterizing Implications of Injective Partial Orders
Abstract. Previous work of the authors has studied a notion of implication between sets of sequences based on the conceptual structure of a Galois lattice, and also a way of repres...
José L. Balcázar, Gemma C. Garriga
ICDM
2002
IEEE
145views Data Mining» more  ICDM 2002»
14 years 17 days ago
Mining Top-K Frequent Closed Patterns without Minimum Support
In this paper, we propose a new mining task: mining top-k frequent closed patterns of length no less than min , where k is the desired number of frequent closed patterns to be min...
Jiawei Han, Jianyong Wang, Ying Lu, Petre Tzvetkov
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 7 months ago
Discovering potential user browsing behaviors using custom-built apriori algorithm
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a whi...
Sandeep Singh Rawat, Lakshmi Rajamani
IRI
2005
IEEE
14 years 1 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...