Sciweavers

312 search results - page 15 / 63
» A General Divide and Conquer Approach for Process Mining
Sort
View
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
15 years 11 months ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
15 years 11 months ago
Effective and efficient itemset pattern summarization: regression-based approaches
In this paper, we propose a set of novel regression-based approaches to effectively and efficiently summarize frequent itemset patterns. Specifically, we show that the problem of ...
Ruoming Jin, Muad Abu-Ata, Yang Xiang, Ning Ruan
117
Voted
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 17 days ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
EDBT
2006
ACM
143views Database» more  EDBT 2006»
15 years 11 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
SACMAT
2010
ACM
14 years 9 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu