Sciweavers

518 search results - page 8 / 104
» Data Mining Techniques on the Evaluation of Wireless Churn
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ICDM
2010
IEEE
185views Data Mining» more  ICDM 2010»
14 years 7 months ago
Detecting Non-compliant Consumers in Spatio-Temporal Health Data: A Case Study from Medicare Australia
This paper describes our experience with applying data mining techniques to the problem of fraud detection in spatio-temporal health data in Medicare Australia. A modular framework...
Kee Siong Ng, Yin Shan, D. Wayne Murray, Alison Su...
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 2 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
PAKDD
2010
ACM
208views Data Mining» more  PAKDD 2010»
14 years 11 months ago
Efficient Pattern Mining of Uncertain Data with Sampling
Mining frequent itemsets from transactional datasets is a well known problem with good algorithmic solutions. In the case of uncertain data, however, several new techniques have be...
Toon Calders, Calin Garboni, Bart Goethals
UM
2009
Springer
15 years 4 months ago
Evaluating Web Based Instructional Models Using Association Rule Mining
Abstract. In this paper we describe an Integrated Development System for Instructional Model for E-learning (INDESIME) to create and to maintain instructional models using adaptive...
Enrique García, Cristóbal Romero, Se...