Sciweavers

3651 search results - page 113 / 731
» Data Mining for Security Applications
Sort
View
ICTAI
1999
IEEE
15 years 9 months ago
Neural Data Mining for Credit Card Fraud Detection
The prevention of credit card fraud is an important application for prediction techniques. One major obstacle for using neural network training techniques is the high necessary di...
R. Brause, T. Langsdorf, Michael Hepp
CIKM
2008
Springer
15 years 6 months ago
Efficient frequent pattern mining over data streams
This paper proposes a prefix-tree structure, called CPS-tree (Compact Pattern Stream tree) that efficiently discovers the exact set of recent frequent patterns from high-speed dat...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...
COLING
2008
15 years 6 months ago
Applying Discourse Analysis and Data Mining Methods to Spoken OSCE Assessments
This paper looks at the transcribed data of patient-doctor consultations in an examination setting. The doctors are internationally qualified and enrolled in a bridging course as ...
Meladel Mistica, Timothy Baldwin, Marisa Cordella,...
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 6 months ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu
HAIS
2009
Springer
15 years 9 months ago
A Generic and Extendible Multi-Agent Data Mining Framework
A generic and extendible Multi-Agent Data Mining (MADM) framework, EMADS (the Extendible Multi-Agent Data mining System) is described. The central feature of the framework is that ...
Kamal Ali Albashiri, Frans Coenen