Sciweavers

1453 search results - page 134 / 291
» Mining for Useful Association Rules Using the ATMS
Sort
View
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
16 years 4 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
ICFEM
2004
Springer
15 years 9 months ago
From Circus to JCSP
Circus is a combination of Z, CSP, and Morgan’s refinement calculus; it has an associated refinement strategy that supports the development of reactive programs. In this work, ...
Marcel Oliveira, Ana Cavalcanti
PKDD
2001
Springer
108views Data Mining» more  PKDD 2001»
15 years 8 months ago
Knowledge Discovery in Multi-label Phenotype Data
The biological sciences are undergoing an explosion in the amount of available data. New data analysis methods are needed to deal with the data. We present work using KDD to analys...
Amanda Clare, Ross D. King
160
Voted
CEAS
2008
Springer
15 years 6 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
RSCTC
2000
Springer
144views Fuzzy Logic» more  RSCTC 2000»
15 years 7 months ago
Valued Tolerance and Decision Rules
In this paper we introduce the concept of valued tolerance as an extension of the usual concept of indiscernibility (which is a crisp equivalence relation) in rough sets theory. So...
Jerzy Stefanowski, Alexis Tsoukiàs