Sciweavers

3651 search results - page 89 / 731
» Data Mining for Security Applications
Sort
View
104
Voted
AEI
2007
75views more  AEI 2007»
15 years 23 days ago
Mining data from intensive care patients
In this paper we describe the application of data mining methods for predicting the evolution of patients in an intensive care unit. We discuss the importance of such methods for ...
Jan Ramon, Daan Fierens, Fabián Güiza,...
104
Voted
IFIP12
2008
15 years 2 months ago
Agent Based Frequent Set Meta Mining: Introducing EMADS
In this paper we: introduce EMADS, the Extendible Multi-Agent Data mining System, to support the dynamic creation of communities of data mining agents; explore the capabilities of ...
Kamal Ali Albashiri, Frans Coenen, Paul H. Leng
CIKM
2009
Springer
15 years 7 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 1 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
KDD
2003
ACM
142views Data Mining» more  KDD 2003»
16 years 1 months ago
Mining phenotypes and informative genes from gene expression data
Mining microarray gene expression data is an important research topic in bioinformatics with broad applications. While most of the previous studies focus on clustering either gene...
Chun Tang, Aidong Zhang, Jian Pei