Sciweavers

KAIS
2000
86views more  KAIS 2000»
13 years 8 months ago
A Mathematical Foundation for Improved Reduct Generation in Information Systems
When data sets are analyzed, statistical pattern recognition is often used to find the information hidden in the data. Another approach to information discovery is data mining. Dat...
Janusz A. Starzyk, Dale E. Nelson, Kirk Sturtz
JCS
2000
148views more  JCS 2000»
13 years 8 months ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
JASIS
2000
143views more  JASIS 2000»
13 years 8 months ago
Discovering knowledge from noisy databases using genetic programming
s In data mining, we emphasize the need for learning from huge, incomplete and imperfect data sets (Fayyad et al. 1996, Frawley et al. 1991, Piatetsky-Shapiro and Frawley, 1991). T...
Man Leung Wong, Kwong-Sak Leung, Jack C. Y. Cheng
DPD
2002
125views more  DPD 2002»
13 years 8 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
CORR
2002
Springer
139views Education» more  CORR 2002»
13 years 8 months ago
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
Currently statistical and artificial neural network methods dominate in financial data mining. Alternative relational (symbolic) data mining methods have shown their effectiveness...
Boris Kovalerchuk, Evgenii Vityaev, H. Yusupov
CORR
2004
Springer
122views Education» more  CORR 2004»
13 years 8 months ago
"In vivo" spam filtering: A challenge problem for data mining
Spam, also known as Unsolicited Commercial Email (UCE), is the bane of email communication. Many data mining researchers have addressed the problem of detecting spam, generally by...
Tom Fawcett
COR
2004
115views more  COR 2004»
13 years 8 months ago
Evaluation of decision trees: a multi-criteria approach
Data mining (DM) techniques are being increasingly used in many modern organizations to retrieve valuable knowledge structures from organizational databases, including data wareho...
Kweku-Muata Osei-Bryson
JUCS
2007
112views more  JUCS 2007»
13 years 8 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski
JUCS
2007
118views more  JUCS 2007»
13 years 8 months ago
A Model of Immune Gene Expression Programming for Rule Mining
: Rule mining is an important issue in data mining. To address it, a novel Immune Gene Expression Programming (IGEP) model was proposed. Concepts of rule, gene, immune cell, and an...
Tao Zeng, Changjie Tang, Yong Xiang, Peng Chen, Yi...
JODS
2007
142views Data Mining» more  JODS 2007»
13 years 8 months ago
Context Dependency Management in Ontology Engineering: A Formal Approach
Abstract. A viable ontology engineering methodology requires supporting domain experts in gradually building and managing increasingly complex versions of ontological elements and ...
Pieter De Leenheer, Aldo de Moor, Robert Meersman