Sciweavers

155 search results - page 22 / 31
» Discovering Structural Patterns in Telecommunications Data
Sort
View
CIDM
2009
IEEE
15 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
HPCC
2005
Springer
15 years 3 months ago
High Performance Subgraph Mining in Molecular Compounds
Structured data represented in the form of graphs arises in several fields of the science and the growing amount of available data makes distributed graph mining techniques partic...
Giuseppe Di Fatta, Michael R. Berthold
DKE
2007
95views more  DKE 2007»
14 years 9 months ago
Strategies for improving the modeling and interpretability of Bayesian networks
One of the main factors for the knowledge discovery success is related to the comprehensibility of the patterns discovered by applying data mining techniques. Amongst which we can...
Ádamo L. de Santana, Carlos Renato Lisboa F...
VISUAL
2007
Springer
15 years 3 months ago
Potentialities of Chorems as Visual Summaries of Geographic Databases Contents
Chorems are schematized representations of territories, and so they can represent a good visual summary of spatial databases. Indeed for spatial decision-makers, it is more importa...
Vincenzo Del Fatto, Robert Laurini, Karla Lopez, R...
WISE
2002
Springer
15 years 2 months ago
Log Mining to Improve the Performance of Site Search
Despite of the popularity of global search engines, people still suffer from low accuracy of site search. The primary reason lies in the difference of link structures and data sca...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...