Sciweavers

718 search results - page 95 / 144
» Mining exception-handling rules as sequence association rule...
Sort
View
JCP
2006
173views more  JCP 2006»
13 years 7 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
CIKM
2005
Springer
14 years 1 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
14 years 8 months ago
CFI-Stream: mining closed frequent itemsets in data streams
Mining frequent closed itemsets provides complete and condensed information for non-redundant association rules generation. Extensive studies have been done on mining frequent clo...
Nan Jiang, Le Gruenwald
AI
2004
Springer
14 years 1 months ago
Distributed Data Mining vs. Sampling Techniques: A Comparison
To address the of mining a huge volume of geographically distributed databases, we propose two approaches. The first one is to download only a sample of each database. The second ...
Mohamed Aounallah, Sébastien Quirion, Guy W...
AIME
2009
Springer
13 years 5 months ago
Mining Safety Signals in Spontaneous Reports Database Using Concept Analysis
Abstract. In pharmacovigilance, linking the adverse reactions by patients to drugs they took is a key activity typically based on the analysis of patient reports. Yet generating po...
Mohamed Rouane Hacene, Yannick Toussaint, Petko Va...