Sciweavers

3651 search results - page 608 / 731
» Data Mining for Security Applications
Sort
View
DAWAK
2001
Springer
15 years 3 months ago
Adaptable Similarity Search Using Vector Quantization
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining applications, particularly for domains such as multimedia, CAD, molecular ...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...
DEXA
2004
Springer
91views Database» more  DEXA 2004»
15 years 2 months ago
Efficient Processing of Distributed Iceberg Semi-joins
The Iceberg SemiJoin (ISJ) of two datasets R and S returns the tuples in R which join with at least k tuples of S. The ISJ operator is essential in many practical applications incl...
Mohammed Kasim Imthiyaz, Dong Xiaoan, Panos Kalnis
DMIN
2006
132views Data Mining» more  DMIN 2006»
15 years 15 days ago
Discovering Accurate and Interesting Classification Rules Using Genetic Algorithm
Discovering accurate and interesting classification rules is a significant task in the post-processing stage of a data mining (DM) process. Therefore, an optimization problem exis...
Janaki Gopalan, Reda Alhajj, Ken Barker
IJCAI
2003
15 years 15 days ago
Intelligent Techniques for Web Personalization
In this chapter we provide a comprehensive overview of the topic of Intelligent Techniques for Web Personalization. Web Personalization is viewed as an application of data mining a...
Sarabjot S. Anand, Bamshad Mobasher
RECSYS
2010
ACM
14 years 11 months ago
Incremental collaborative filtering via evolutionary co-clustering
Collaborative filtering is a popular approach for building recommender systems. Current collaborative filtering algorithms are accurate but also computationally expensive, and so ...
Mohammad Khoshneshin, W. Nick Street