Sciweavers

2705 search results - page 230 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
128
Voted
KDD
2008
ACM
246views Data Mining» more  KDD 2008»
16 years 3 months ago
Direct mining of discriminative and essential frequent patterns via model-based search tree
Frequent patterns provide solutions to datasets that do not have well-structured feature vectors. However, frequent pattern mining is non-trivial since the number of unique patter...
Wei Fan, Kun Zhang, Hong Cheng, Jing Gao, Xifeng Y...
119
Voted
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 8 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
114
Voted
ACSW
2006
15 years 4 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
130
Voted
EDM
2008
169views Data Mining» more  EDM 2008»
15 years 4 months ago
Mining Student Behavior Models in Learning-by-Teaching Environments
This paper discusses our approach to building models and analyzing student behaviors in different versions of our learning by teaching environment where students learn by teaching ...
Hogyeong Jeong, Gautam Biswas
WWW
2009
ACM
16 years 3 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other use...
Andreas Lommatzsch, Christian Bauckhage, Jé...