Sciweavers

3651 search results - page 44 / 731
» Data Mining for Security Applications
Sort
View
110
Voted
MSR
2009
ACM
15 years 5 months ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
90
Voted
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
15 years 4 months ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
90
Voted
CIKM
2009
Springer
15 years 3 months ago
Mining data streams with periodically changing distributions
Dynamic data streams are those whose underlying distribution changes over time. They occur in a number of application domains, and mining them is important for these applications....
Yingying Tao, M. Tamer Özsu
113
Voted
ICDM
2002
IEEE
109views Data Mining» more  ICDM 2002»
15 years 5 months ago
Using Text Mining to Infer Semantic Attributes for Retail Data Mining
Current Data Mining techniques usually do not have a mechanism to automatically infer semantic features inherent in the data being “mined”. The semantics are either injected i...
Rayid Ghani, Andrew E. Fano
102
Voted
ISMIS
1999
Springer
15 years 4 months ago
Applications and Research Problems of Subgroup Mining
Knowledge Discovery in Databases (KDD) is a data analysis process which, in contrast to conventional data analysis, automatically generates and evaluates very many hypotheses, deal...
Willi Klösgen