Sciweavers

2705 search results - page 238 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
124
Voted
SDM
2009
SIAM
144views Data Mining» more  SDM 2009»
15 years 12 months ago
On Segment-Based Stream Modeling and Its Applications.
The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
Charu C. Aggarwal
140
Voted
CIKM
2005
Springer
15 years 8 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
114
Voted
PAKDD
2004
ACM
183views Data Mining» more  PAKDD 2004»
15 years 8 months ago
Constraint-Based Graph Clustering through Node Sequencing and Partitioning
This paper proposes a two-step graph partitioning method to discover constrained clusters with an objective function that follows the well-known minmax clustering principle. Compar...
Yu Qian, Kang Zhang, Wei Lai
106
Voted
KDD
2001
ACM
169views Data Mining» more  KDD 2001»
16 years 3 months ago
Hierarchical cluster analysis of SAGE data for cancer profiling
In this paper we present a method for clustering SAGE (Serial Analysis of Gene Expression) data to detect similarities and dissimilarities between different types of cancer on the...
Jörg Sander, Monica C. Sleumer, Raymond T. Ng
123
Voted
KDD
1998
ACM
129views Data Mining» more  KDD 1998»
15 years 6 months ago
Data Reduction Based on Hyper Relations
Data reduction makes datasets smaller but preserves classication structures of interest. It is an important area of research in data mining and databases. In this paper we present...
Hui Wang, Ivo Düntsch, David A. Bell