Sciweavers

KDD
1998
ACM
147views Data Mining» more  KDD 1998»
14 years 26 days ago
ADtrees for Fast Counting and for Fast Learning of Association Rules
Abstract: The problem of discovering association rules in large databases has received considerable research attention. Much research has examined the exhaustive discovery of all a...
Brigham S. Anderson, Andrew W. Moore
IPPS
1998
IEEE
14 years 27 days ago
High Performance Data Mining Using Data Cubes on Parallel Computers
On-Line Analytical Processing techniques are used for data analysis and decision support systems. The multidimensionality of the underlying data is well represented by multidimens...
Sanjay Goil, Alok N. Choudhary
ICSM
1998
IEEE
14 years 27 days ago
Identification of Data Cohesive Subsystems Using Data Mining Techniques
The activity of reengineering and maintaining large legacy systems involves the use of design recovery es to produce abstractions that facilitate the understanding of the system. ...
Carlos Montes de Oca, Doris L. Carver
RSFDGRC
1999
Springer
135views Data Mining» more  RSFDGRC 1999»
14 years 27 days ago
The Iterated Version Space Learning
Inspired with Version Space learning, the Iterated Version Space Algorithm (IVSA) has been designed and implemented to learn disjunctive concepts. IVSA dynamically partitions its s...
Jianna Jian Zhang, Nick Cercone
RSFDGRC
1999
Springer
117views Data Mining» more  RSFDGRC 1999»
14 years 27 days ago
A Generalized Decision Logic in Interval-Set-Valued Information Tables
Abstract. A generalized decision logic in interval-set-valued information tables is introduced, which is an extension of decision logic studied by Pawlak. Each object in an interva...
Y. Y. Yao, Qing Liu
RSFDGRC
1999
Springer
140views Data Mining» more  RSFDGRC 1999»
14 years 27 days ago
A Rough Set-Based Approach to Text Classification
Alexios Chouchoulas, Qiang Shen
RSFDGRC
1999
Springer
194views Data Mining» more  RSFDGRC 1999»
14 years 27 days ago
A Closest Fit Approach to Missing Attribute VAlues in Preterm Birth Data
: In real-life data, in general, many attribute values are missing. Therefore, rule induction requires preprocessing, where missing attribute values are replaced by appropriate val...
Jerzy W. Grzymala-Busse, Witold J. Grzymala-Busse,...
RAID
1999
Springer
14 years 27 days ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
RAID
1999
Springer
14 years 27 days ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo