Sciweavers

3651 search results - page 153 / 731
» Data Mining for Security Applications
Sort
View
KDD
2003
ACM
175views Data Mining» more  KDD 2003»
16 years 5 months ago
Weighted Association Rule Mining using weighted support and significance framework
We address the issues of discovering significant binary relationships in transaction datasets in a weighted setting. Traditional model of association rule mining is adapted to han...
Feng Tao, Fionn Murtagh, Mohsen Farid
KDD
2001
ACM
262views Data Mining» more  KDD 2001»
16 years 5 months ago
LOGML: Log Markup Language for Web Usage Mining
Web Usage Mining refers to the discovery of interesting information from user navigational behavior as stored in web access logs. While extracting simple information from web logs...
John R. Punin, Mukkai S. Krishnamoorthy, Mohammed ...
PAKDD
2007
ACM
166views Data Mining» more  PAKDD 2007»
15 years 11 months ago
gPrune: A Constraint Pushing Framework for Graph Pattern Mining
In graph mining applications, there has been an increasingly strong urge for imposing user-specified constraints on the mining results. However, unlike most traditional itemset co...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu
153
Voted
BTW
2009
Springer
122views Database» more  BTW 2009»
15 years 6 months ago
Model-based Classification of Data with Time Series-valued Attributes
: Similarity search and data mining on time series databases has recently attracted much attention. In this paper, we represent a data object by several time series-valued attribut...
Christian Böhm, L. Läer, Claudia Plant, ...
145
Voted
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 3 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...