Sciweavers

953 search results - page 66 / 191
» Mining functional dependencies from data
Sort
View
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
DATAMINE
2000
115views more  DATAMINE 2000»
13 years 8 months ago
Integrating Association Rule Mining with Relational Database Systems: Alternatives and Implications
Data mining on large data warehouses is becoming increasingly important. In support of this trend, we consider a spectrum of architectural alternatives for coupling mining with da...
Sunita Sarawagi, Shiby Thomas, Rakesh Agrawal
NAR
2002
138views more  NAR 2002»
13 years 8 months ago
The Protein Information Resource: an integrated public resource of functional annotation of proteins
The Protein Information Resource (PIR) serves as an integrated public resource of functional annotation of protein data to support genomic/proteomic research and scientific discov...
Cathy H. Wu, Hongzhan Huang, Leslie Arminski, Jorg...
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
14 years 9 months ago
Correlation search in graph databases
Correlation mining has gained great success in many application domains for its ability to capture the underlying dependency between objects. However, the research of correlation ...
Yiping Ke, James Cheng, Wilfred Ng
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
14 years 17 days ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick