Sciweavers

3651 search results - page 84 / 731
» Data Mining for Security Applications
Sort
View
EDBT
2002
ACM
157views Database» more  EDBT 2002»
16 years 4 months ago
Profit Mining: From Patterns to Actions
Abstract. A major obstacle in data mining applications is the gap between the statistic-based pattern extraction and the value-based decision making. We present a profit mining app...
Ke Wang, Senqiang Zhou, Jiawei Han
KDD
1998
ACM
107views Data Mining» more  KDD 1998»
15 years 8 months ago
Giga-Mining
Wedescribe an industrial-strength data mining application in telecommunications.Theapplication requires building a short (7 byte) profile for all telephonenumbersseen on a large t...
Corinna Cortes, Daryl Pregibon
AAAI
2007
15 years 6 months ago
Using AI for e-Government Automatic Assessment of Immigration Application Forms
This paper describes an e-Government AI project that provides a range of intelligent AI services to support automated assessment of various types of applications submitted to an i...
Andy Hon Wai Chun
183
Voted
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 11 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 9 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic