Sciweavers

301 search results - page 15 / 61
» Mining the Most Interesting Web Access Associations
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 8 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
RSFDGRC
2005
Springer
110views Data Mining» more  RSFDGRC 2005»
14 years 2 months ago
A Rough Set Based Model to Rank the Importance of Association Rules
Abstract. Association rule algorithms often generate an excessive number of rules, many of which are not significant. It is difficult to determine which rules are more useful, int...
Jiye Li, Nick Cercone
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 9 months ago
Support envelopes: a technique for exploring the structure of association patterns
This paper introduces support envelopes--a new tool for analyzing association patterns--and illustrates some of their properties, applications, and possible extensions. Specifical...
Michael Steinbach, Pang-Ning Tan, Vipin Kumar
ITCC
2005
IEEE
14 years 2 months ago
Elimination of Redundant Information for Web Data Mining
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditi...
Shakirah Mohd Taib, Soon-ja Yeom, Byeong Ho Kang
CIKM
2001
Springer
14 years 1 months ago
A Domain Independent Environment for Creating Information Extraction Modules
Text-Mining is a growing area of interest within the field of Data Mining and Knowledge Discovery. Given a collection of text documents, most approaches to Text Mining perform kno...
Ronen Feldman, Yonatan Aumann, Yair Liberzon, Kfir...