Sciweavers

2705 search results - page 72 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SDM
2004
SIAM
224views Data Mining» more  SDM 2004»
13 years 10 months ago
Hierarchical Clustering for Thematic Browsing and Summarization of Large Sets of Association Rules
In this paper we propose a method for grouping and summarizing large sets of association rules according to the items contained in each rule. We use hierarchical clustering to par...
Alípio Jorge
SAC
2006
ACM
14 years 3 months ago
Discretization from data streams: applications to histograms and data mining
Abstract. In this paper we propose a new method to perform incremental discretization. The basic idea is to perform the task in two layers. The first layer receives the sequence o...
João Gama, Carlos Pinto
CIT
2006
Springer
14 years 23 days ago
Fuzzy data mining for customer loyalty analysis
One of the major conceptual analyses in analytical CRM is customer loyalty. Current methods use user defined and statistical methods for loyalty analysis. One of the major limitat...
Jay B. Simha, S. S. Iyengar
CCS
2006
ACM
14 years 24 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
ISQED
2003
IEEE
113views Hardware» more  ISQED 2003»
14 years 2 months ago
Using Integer Equations for High Level Formal Verification Property Checking
This paper describes the use of integer equations for high level modeling digital circuits for application of formal verification properties at this level. Most formal verificatio...
Bijan Alizadeh, Mohammad Reza Kakoee