Sciweavers

446 search results - page 67 / 90
» Randomization in Privacy-Preserving Data Mining
Sort
View
KDD
2005
ACM
182views Data Mining» more  KDD 2005»
14 years 10 months ago
Making holistic schema matching robust: an ensemble approach
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. As an essential task toward integrating these m...
Bin He, Kevin Chen-Chuan Chang
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
13 years 7 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
ICDE
2012
IEEE
246views Database» more  ICDE 2012»
12 years 12 days ago
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking
—Outlier mining is a major task in data analysis. Outliers are objects that highly deviate from regular objects in their local neighborhood. Density-based outlier ranking methods...
Fabian Keller, Emmanuel Müller, Klemens B&oum...
JMLR
2010
120views more  JMLR 2010»
13 years 4 months ago
Effective Wrapper-Filter hybridization through GRASP Schemata
Of all of the challenges which face the selection of relevant features for predictive data mining or pattern recognition modeling, the adaptation of computational intelligence tec...
Mohamed Amir Esseghir
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
14 years 10 months ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian