Sciweavers

2705 search results - page 181 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
PKDD
2010
Springer
155views Data Mining» more  PKDD 2010»
13 years 8 months ago
Latent Structure Pattern Mining
Pattern mining methods for graph data have largely been restricted to ground features, such as frequent or correlated subgraphs. Kazius et al. have demonstrated the use of elaborat...
Andreas Maunz, Christoph Helma, Tobias Cramer, Ste...
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
14 years 2 months ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
14 years 4 months ago
Parameter Tuning for Differential Mining of String Patterns
Constraint-based mining has been proven to be extremely useful for supporting actionable pattern discovery. However, useful conjunctions of constraints that support domain driven ...
Jérémy Besson, Christophe Rigotti, I...
ICDM
2005
IEEE
129views Data Mining» more  ICDM 2005»
14 years 4 months ago
Mining Chains of Relations
Traditional data mining applications consider the problem of mining a single relation between two attributes. For example, in a scientific bibliography database, authors are rela...
Foto N. Afrati, Gautam Das, Aristides Gionis, Heik...
VLDB
2004
ACM
99views Database» more  VLDB 2004»
14 years 3 months ago
Query Languages and Data Models for Database Sequences and Data Streams
We study the fundamental limitations of relational algebra (RA) and SQL in supporting sequence and stream queries, and present effective query language and data model enrichments ...
Yan-Nei Law, Haixun Wang, Carlo Zaniolo