Sciweavers

1056 search results - page 80 / 212
» Association Rule Mining Algorithms for Set-Valued Data
Sort
View
IPCCC
2007
IEEE
15 years 4 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
ICDM
2005
IEEE
130views Data Mining» more  ICDM 2005»
15 years 3 months ago
Obtaining Best Parameter Values for Accurate Classification
In this paper we examine the effect that the choice of support and confidence thresholds has on the accuracy of classifiers obtained by Classification Association Rule Mining. ...
Frans Coenen, Paul H. Leng
SOFTVIS
2005
ACM
15 years 3 months ago
Visual data mining in software archives
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Michael Burch, Stephan Diehl, Peter Weißgerb...
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 1 months ago
Direct mining of discriminative patterns for classifying uncertain data
Classification is one of the most essential tasks in data mining. Unlike other methods, associative classification tries to find all the frequent patterns existing in the input...
Chuancong Gao, Jianyong Wang
ACIIDS
2009
IEEE
162views Database» more  ACIIDS 2009»
15 years 2 months ago
Deriving Conceptual Schema from XML Databases
In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of i...
Oviliani Yenty Yuliana, Suphamit Chittayasothorn