Sciweavers

3651 search results - page 111 / 731
» Data Mining for Security Applications
Sort
View
JSW
2008
99views more  JSW 2008»
15 years 4 months ago
Using Data Mining in MURA Graphic Problems
The MURA phenomenon will result lots of problems in Photomask and TFT-LCD industries as well. In this paper, we designed and developed a MURA related association rules which suitab...
Wen-Hsing Kao, Jason C. Hung, Victoria Hsu
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
15 years 10 months ago
Movie Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches
Web content mining is intended to help people discover valuable information from large amount of unstructured data on the web. Movie review mining classifies movie reviews into tw...
Pimwadee Chaovalit, Lina Zhou
129
Voted
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 8 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
WLP
2004
Springer
15 years 10 months ago
SQL Based Frequent Pattern Mining with FP-Growth
Scalable data mining in large databases is one of today’s real challenges to database research area. The integration of data mining with database systems is an essential componen...
Xuequn Shang, Kai-Uwe Sattler, Ingolf Geist
DASFAA
2008
IEEE
149views Database» more  DASFAA 2008»
15 years 5 months ago
A Test Paradigm for Detecting Changes in Transactional Data Streams
A pattern is considered useful if it can be used to help a person to achieve his goal. Mining data streams for useful patterns is important in many applications. However, data stre...
Willie Ng, Manoranjan Dash