Sciweavers

4085 search results - page 286 / 817
» Benchmarking Data Mining Algorithms
Sort
View
CIDM
2009
IEEE
15 years 10 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
161
Voted
DEXAW
2007
IEEE
92views Database» more  DEXAW 2007»
15 years 10 months ago
Subtree Testing and Closed Tree Mining Through Natural Representations
Several classical schemes exist to represent trees as strings over a fixed alphabet; these are useful in many algorithmic and conceptual studies. Our previous work has proposed a...
José L. Balcázar, Albert Bifet, Anto...
143
Voted
ICTAI
2006
IEEE
15 years 10 months ago
Sequence Mining Without Sequences: A New Way for Privacy Preserving
During the last decade, sequential pattern mining has been the core of numerous researches. It is now possible to efficiently discover users’ behavior in various domains such a...
Stéphanie Jacquemont, François Jacqu...
CG
2007
Springer
15 years 4 months ago
A 2D-3D visualization support for human-centered rule mining
On account of the enormous amounts of rules that can be produced by data mining algorithms, knowledge post-processing is a difficult stage in an association rule discovery process....
Julien Blanchard, Bruno Pinaud, Pascale Kuntz, Fab...
134
Voted
TKDE
2008
128views more  TKDE 2008»
15 years 3 months ago
Mixed-Drove Spatiotemporal Co-Occurrence Pattern Mining
Mixed-drove spatiotemporal co-occurrence patterns (MDCOPs) represent subsets of two or more different object-types whose instances are often located in spatial and temporal proximi...
Mete Celik, Shashi Shekhar, James P. Rogers, James...