Sciweavers

3651 search results - page 91 / 731
» Data Mining for Security Applications
Sort
View
136
Voted
SDM
2011
SIAM
243views Data Mining» more  SDM 2011»
14 years 3 months ago
Data Integration via Constrained Clustering: An Application to Enzyme Clustering
When multiple data sources are available for clustering, an a priori data integration process is usually required. This process may be costly and may not lead to good clusterings,...
Elisa Boari de Lima, Raquel Cardoso de Melo Minard...
119
Voted
KDD
2001
ACM
187views Data Mining» more  KDD 2001»
16 years 1 months ago
Random projection in dimensionality reduction: applications to image and text data
Random projections have recently emerged as a powerful method for dimensionality reduction. Theoretical results indicate that the method preserves distances quite nicely; however,...
Ella Bingham, Heikki Mannila
WISE
2010
Springer
14 years 10 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
KDD
2005
ACM
91views Data Mining» more  KDD 2005»
16 years 1 months ago
On mining cross-graph quasi-cliques
Joint mining of multiple data sets can often discover interesting, novel, and reliable patterns which cannot be obtained solely from any single source. For example, in cross-marke...
Jian Pei, Daxin Jiang, Aidong Zhang
107
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 9 months ago
Randomization Techniques for Graphs.
Mining graph data is an active research area. Several data mining methods and algorithms have been proposed to identify structures from graphs; still, the evaluation of those resu...
Gemma C. Garriga, Kai Puolamäki, Sami Hanhij&...