Sciweavers

2705 search results - page 97 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 9 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
WINE
2005
Springer
268views Economy» more  WINE 2005»
14 years 2 months ago
Mining Stock Market Tendency Using GA-Based Support Vector Machines
In this study, a hybrid intelligent data mining methodology, genetic algorithm based support vector machine (GASVM) model, is proposed to explore stock market tendency. In this hyb...
Lean Yu, Shouyang Wang, Kin Keung Lai
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
IJAR
2011
118views more  IJAR 2011»
13 years 17 days ago
A sequential pattern mining algorithm using rough set theory
Sequential pattern mining is a crucial but challenging task in many applications, e.g., analyzing the behaviors of data in transactions and discovering frequent patterns in time se...
Ken Kaneiwa, Yasuo Kudo
DKE
2010
167views more  DKE 2010»
13 years 6 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...