Sciweavers

IEAAIE
2000
Springer
13 years 8 months ago
Information Management and Process Improvement Using Data Mining Techniques
This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...
COMPSAC
2004
IEEE
13 years 8 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
KDD
1994
ACM
82views Data Mining» more  KDD 1994»
13 years 8 months ago
Architectural Support for Data Mining
Oneof the mainobstacles in applying data mining techniques to large, real-world databasesis the lack of efficient data management.In this paper, wepresent the design and implement...
Marcel Holsheimer, Martin L. Kersten
KDD
1997
ACM
120views Data Mining» more  KDD 1997»
13 years 8 months ago
Discovering Trends in Text Databases
We describe a system we developed for identifying trends in text documents collected over a period of time. Trends can be used, for example, to discover that a company is shifting...
Brian Lent, Rakesh Agrawal, Ramakrishnan Srikant
HIPC
1999
Springer
13 years 8 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
DAWAK
2000
Springer
13 years 9 months ago
Data Mining Support in Database Management Systems
Abstract. The most popular data mining techniques consist in searching databases for frequently occurring patterns, e.g. association rules, sequential patterns. We argue that in co...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...
ECAGENTS
2001
Springer
127views ECommerce» more  ECAGENTS 2001»
13 years 9 months ago
User-Centered Agents for Structured Information Location
Abstract. This paper designs an electronic commerce system that integrates conventional electronic commerce services with contemporary WWW advantages, such as comprehensive coverag...
Xindong Wu, Daniel Ngu, Sameer Pradhan
CAISE
2003
Springer
13 years 9 months ago
Evaluation of the SRA Tool Using Data Mining Techniques
This paper describes a validation approach of a socio-technical design support system using data mining techniques. Bayesian Belief Networks (BBN) are used to assess human error an...
Andreas Gregoriades, Alistair G. Sutcliffe, Harala...
WPES
2003
ACM
13 years 9 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
13 years 9 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton