Sciweavers

6388 search results - page 244 / 1278
» High Performance Data Mining
Sort
View
IEEEARES
2010
IEEE
15 years 10 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 6 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDM
2007
IEEE
206views Data Mining» more  ICDM 2007»
15 years 11 months ago
A Novel Rule Weighting Approach in Classification Association Rule Mining
Classification Association Rule Mining (CARM) is a recent Classification Rule Mining (CRM) approach that builds an Association Rule Mining (ARM) based classifier using Classificat...
Yanbo J. Wang, Qin Xin, Frans Coenen
ICDM
2003
IEEE
160views Data Mining» more  ICDM 2003»
15 years 10 months ago
Indexing and Mining Free Trees
Tree structures are used extensively in domains such as computational biology, pattern recognition, computer networks, and so on. In this paper, we present an indexing technique f...
Yun Chi, Yirong Yang, Richard R. Muntz
GIS
2008
ACM
16 years 6 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...