Sciweavers

2705 search results - page 129 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SDM
2007
SIAM
184views Data Mining» more  SDM 2007»
13 years 10 months ago
Mining Naturally Smooth Evolution of Clusters from Dynamic Data
Many clustering algorithms have been proposed to partition a set of static data points into groups. In this paper, we consider an evolutionary clustering problem where the input d...
Yi Wang, Shi-Xia Liu, Jianhua Feng, Lizhu Zhou
IFIP13
2004
13 years 10 months ago
Formal Verification and Validation of Interactive Systems Specifications
: This paper proposes a development process for interactive systems based both on verification and validation methods. Our approach is formal and use at first the B Method. We show...
Yamine Aït Ameur, Benoit Breholée, Pat...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 9 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
INCDM
2010
Springer
204views Data Mining» more  INCDM 2010»
14 years 18 days ago
Combining Business Process and Data Discovery Techniques for Analyzing and Improving Integrated Care Pathways
Hospitals increasingly use process models for structuring their care processes. Activities performed to patients are logged to a database but these data are rarely used for managin...
Jonas Poelmans, Guido Dedene, Gerda Verheyden, Her...
DATAMINE
1999
140views more  DATAMINE 1999»
13 years 8 months ago
A Scalable Parallel Algorithm for Self-Organizing Maps with Applications to Sparse Data Mining Problems
Abstract. We describe a scalable parallel implementation of the self organizing map (SOM) suitable for datamining applications involving clustering or segmentation against large da...
Richard D. Lawrence, George S. Almasi, Holly E. Ru...