135
click to vote
DAWAK
15 years 6 months ago
2007 Springer
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
112
click to vote
DAWAK
15 years 4 months ago
2007 Springer
Most methods for temporal pattern mining assume that time is represented by points in a straight line starting at some initial instant. In this paper, we consider a new kind of fir...
DAWAK
15 years 6 months ago
2007 Springer
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
DAWAK
15 years 6 months ago
2007 Springer
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
DAWAK
15 years 4 months ago
2007 Springer
Abstract. Detecting repeated portions of strings has important applications to many areas of study including data compression and computational biology. This paper defines and pres...
|