Sciweavers

2932 search results - page 111 / 587
» Higher order mining
Sort
View
PKDD
2005
Springer
110views Data Mining» more  PKDD 2005»
15 years 10 months ago
k-Anonymous Patterns
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
DKE
2008
98views more  DKE 2008»
15 years 5 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
181
Voted
JUCS
2008
125views more  JUCS 2008»
15 years 5 months ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...
168
Voted
JCP
2008
171views more  JCP 2008»
15 years 5 months ago
Mining Frequent Subgraph by Incidence Matrix Normalization
Existing frequent subgraph mining algorithms can operate efficiently on graphs that are sparse, have vertices with low and bounded degrees, and contain welllabeled vertices and edg...
Jia Wu, Ling Chen
128
Voted
UM
2005
Springer
15 years 10 months ago
Using Learning Curves to Mine Student Models
This paper presents an evaluation study that measures the effect of modifying feedback generality in an Intelligent Tutoring System (ITS) based on Student Models. A taxonomy of the...
Brent Martin, Antonija Mitrovic