Sciweavers

2705 search results - page 75 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
14 years 10 months ago
Similarity Search in Sets and Categorical Data Using the Signature Tree
Data mining applications analyze large collections of set data and high dimensional categorical data. Search on these data types is not restricted to the classic problems of minin...
Nikos Mamoulis, David W. Cheung, Wang Lian
KDD
1998
ACM
250views Data Mining» more  KDD 1998»
14 years 1 months ago
Data Mining for Direct Marketing: Problems and Solutions
Direct marketing is a process of identifying likely buyers of certain products and promoting the products accordingly. It is increasingly used by banks, insurance companies, and t...
Charles X. Ling, Chenghui Li
FLAIRS
2004
13 years 10 months ago
Personalization Using Hybrid Data Mining Approaches in E-Business Applications
Effective personalization is greatly demanded in highly heterogeneous and diverse e-commerce domain. In our approach we rely on the idea that an effective personalization techniqu...
Olena Parkhomenko, Yugyung Lee, Chintan Patel
EDBTW
2010
Springer
14 years 3 months ago
Quantile-based bootstrap methods to generate continuous synthetic data
To face the increasing demand from users, National Statistical Institutes (NSI) release different information products. The dissemination of this information should be performed ...
Daniela Ichim
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 9 months ago
Formalization of the data flow diagram rules for consistency check
In system development life cycle (SDLC), a system model can be developed using Data Flow Diagram (DFD). DFD is graphical diagrams for specifying, constructing and visualizing the ...
Rosziati Ibrahim, Siow Yen yen