Sciweavers

718 search results - page 99 / 144
» Mining exception-handling rules as sequence association rule...
Sort
View
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
14 years 1 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
EEE
2004
IEEE
13 years 11 months ago
Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment
Web usage mining is the process of extracting interesting patterns from web logs. This paper proposes an IPA (Integrating Path traversal patterns and Association rules) model for ...
Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hs...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 2 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICDM
2003
IEEE
126views Data Mining» more  ICDM 2003»
14 years 29 days ago
Mining Relevant Text from Unlabelled Documents
Automatic classification of documents is an important area of research with many applications in the fields of document searching, forensics and others. Methods to perform class...
Daniel Barbará, Carlotta Domeniconi, Ning K...
ISCI
2007
99views more  ISCI 2007»
13 years 7 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong