Sciweavers

32 search results - page 4 / 7
» ausdm 2006
Sort
View
AUSDM
2006
Springer
118views Data Mining» more  AUSDM 2006»
14 years 2 months ago
Efficiently Identifying Exploratory Rules' Significance
How to efficiently discard potentially uninteresting rules in exploratory rule discovery is one of the important research foci in data mining. Many researchers have presented algor...
Shiying Huang, Geoffrey I. Webb
AUSDM
2006
Springer
100views Data Mining» more  AUSDM 2006»
14 years 2 months ago
Data Mining Methodological Weaknesses and Suggested Fixes
Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and t...
John H. Maindonald
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
14 years 2 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
14 years 2 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
AUSDM
2006
Springer
160views Data Mining» more  AUSDM 2006»
14 years 2 months ago
Extraction of Flat and Nested Data Records from Web Pages
This paper deals with studies the problem of identification and extraction of flat and nested data records from a given web page. With the explosive growth of information sources ...
Siddu P. Algur, P. S. Hiremath