Sciweavers

3651 search results - page 133 / 731
» Data Mining for Security Applications
Sort
View
ISAMI
2010
15 years 2 months ago
A Data Mining Approach for the Detection of High-Risk Breast Cancer Groups
It is widely agreed that complex diseases are typically caused by the joint effects of multiple instead of a single genetic variation. These genetic variations may show very little...
Orlando Anunciação, Bruno C. Gomes, ...
146
Voted
ASC
2008
15 years 5 months ago
Dynamic data assigning assessment clustering of streaming data
: Discovering interesting patterns or substructures in data streams is an important challenge in data mining. Clustering algorithms are very often applied to identify single substr...
Olga Georgieva, Frank Klawonn
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 11 months ago
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...
IADIS
2004
15 years 6 months ago
OLAP in enterprise decision modelling
This paper describes the application of online analytical processing (OLAP) in the field of data mining. We discuss knowledge discovery in enterprise databases as well as data war...
Perihan Kilimci, Bora Gökçe, Oya Kalip...
PAKDD
2001
ACM
148views Data Mining» more  PAKDD 2001»
15 years 9 months ago
Scalable Hierarchical Clustering Method for Sequences of Categorical Values
Data clustering methods have many applications in the area of data mining. Traditional clustering algorithms deal with quantitative or categorical data points. However, there exist...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...