Sciweavers

72 search results - page 5 / 15
» kdd 1998
Sort
View
KDD
1998
ACM
107views Data Mining» more  KDD 1998»
13 years 12 months ago
Giga-Mining
Wedescribe an industrial-strength data mining application in telecommunications.Theapplication requires building a short (7 byte) profile for all telephonenumbersseen on a large t...
Corinna Cortes, Daryl Pregibon
KDD
1998
ACM
193views Data Mining» more  KDD 1998»
13 years 12 months ago
Methods for Linking and Mining Massive Heterogeneous Databases
Manyreal-world KDDexpeditions involve investigation of relationships betweenvariables in different, heterogeneousdatabases. Wepresent a dynamic programmingtechnique for linking re...
José C. Pinheiro, Don X. Sun
KDD
1998
ACM
159views Data Mining» more  KDD 1998»
13 years 12 months ago
A Robust System Architecture for Mining Semi-Structured Data
The value of extracting knowledge from semi-structured data is readily apparent with the explosion of the WWW and the advent of digital libraries. This paper proposes a versatile ...
Lisa Singh, Bin Chen, Rebecca Haight, Peter Scheue...
JIIS
1998
161views more  JIIS 1998»
13 years 7 months ago
Mining Text Using Keyword Distributions
Knowledge Discovery in Databases (KDD) focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns within them. While most work on...
Ronen Feldman, Ido Dagan, Haym Hirsh
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 12 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley