Sciweavers

1414 search results - page 58 / 283
» Relational peculiarity-oriented mining
Sort
View
KES
2008
Springer
13 years 8 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
KDD
2003
ACM
195views Data Mining» more  KDD 2003»
14 years 10 months ago
Visualizing changes in the structure of data for exploratory feature selection
Using visualization techniques to explore and understand high-dimensional data is an efficient way to combine human intelligence with the immense brute force computation power ava...
Elias Pampalk, Werner Goebl, Gerhard Widmer
AMINING
2003
Springer
261views Data Mining» more  AMINING 2003»
14 years 3 months ago
Micro View and Macro View Approaches to Discovered Rule Filtering
A data mining system can semi-automatically discover knowledge by mining a large volume of data, but the discovered knowledge is not always novel and may contain unreasonable facts...
Yasuhiko Kitamura, Akira Iida, Keunsik Park
NAACL
2010
13 years 7 months ago
Not All Seeds Are Equal: Measuring the Quality of Text Mining Seeds
Open-class semantic lexicon induction is of great interest for current knowledge harvesting algorithms. We propose a general framework that uses patterns in bootstrapping fashion ...
Zornitsa Kozareva, Eduard H. Hovy
OSDI
2004
ACM
14 years 10 months ago
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code
Copy-pasted code is very common in large software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Recent studies show that copy-paste...
Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou