Sciweavers

263 search results - page 44 / 53
» kDCI: a Multi-Strategy Algorithm for Mining Frequent Sets
Sort
View
PAKDD
2005
ACM
124views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Finding Sporadic Rules Using Apriori-Inverse
We define sporadic rules as those with low support but high confidence: for example, a rare association of two symptoms indicating a rare disease. To find such rules using the w...
Yun Sing Koh, Nathan Rountree
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
14 years 8 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
CINQ
2004
Springer
182views Database» more  CINQ 2004»
14 years 9 days ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
RECOMB
2004
Springer
14 years 8 months ago
Mining protein family specific residue packing patterns from protein structure graphs
Finding recurring residue packing patterns, or spatial motifs, that characterize protein structural families is an important problem in bioinformatics. To this end, we apply a nov...
Jun Huan, Wei Wang 0010, Deepak Bandyopadhyay, Jac...
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...