Sciweavers

391 search results - page 53 / 79
» Ontology Mapping based on Association Rule Mining
Sort
View
ISCI
2007
99views more  ISCI 2007»
13 years 7 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong
WWW
2006
ACM
14 years 8 months ago
Mining related queries from search engine query logs
In this work we propose a method that retrieves a list of related queries given an initial input query. The related queries are based on the query log of previously issued queries...
Xiaodong Shi, Christopher C. Yang
MOBIDE
2010
ACM
13 years 7 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
ESWA
2002
134views more  ESWA 2002»
13 years 7 months ago
A personalized recommender system based on web usage mining and decision tree induction
A personalized product recommendation is an enabling mechanism to overcome information overload occurred when shopping in an Internet marketplace. Collaborative filtering has been...
Yoon Ho Cho, Jae Kyeong Kim, Soung Hie Kim
WCRE
2010
IEEE
13 years 5 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...