Sciweavers

7163 search results - page 1367 / 1433
» Privacy-Preserving Data Mining
Sort
View
AEI
2007
102views more  AEI 2007»
13 years 10 months ago
Incremental development of CBR strategies for computing project cost probabilities
This paper presents three CBR systems that have been developed over seven years in collaboration with two industrial partners. In this research, case based reasoning (CBR) is used...
Benny Raphael, Bernd Domer, Sandro Saitta, Ian F. ...
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 10 months ago
Attribute oriented induction with star schema
: This paper will propose a novel star schema attribute induction as a new attribute induction paradigm and as improving from current attribute oriented induction. A novel star sch...
Spits Warnars H. L. H
COMSUR
2008
108views more  COMSUR 2008»
13 years 10 months ago
A survey of techniques for internet traffic classification using machine learning
The research community has begun looking for IP traffic classification techniques that do not rely on `well known' TCP or UDP port numbers, or interpreting the contents of pac...
Thuy T. T. Nguyen, Grenville J. Armitage
CORR
2008
Springer
123views Education» more  CORR 2008»
13 years 10 months ago
Optimizing Web Sites for Customer Retention
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
Michael Hahsler
CORR
2008
Springer
92views Education» more  CORR 2008»
13 years 10 months ago
Nonnegative Matrix Factorization via Rank-One Downdate
Nonnegative matrix factorization (NMF) was popularized as a tool for data mining by Lee and Seung in 1999. NMF attempts to approximate a matrix with nonnegative entries by a produ...
Michael Biggs, Ali Ghodsi, Stephen A. Vavasis
« Prev « First page 1367 / 1433 Last » Next »