Sciweavers

977 search results - page 123 / 196
» Mining Default Rules from Statistical Data
Sort
View
ICCS
2004
Springer
15 years 4 months ago
Iceberg Query Lattices for Datalog
In this paper we study two orthogonal extensions of the classical data mining problem of mining association rules, and show how they naturally interact. The first is the extension...
Gerd Stumme
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
15 years 5 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu
MSR
2006
ACM
15 years 5 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...
HOTI
2005
IEEE
15 years 5 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
15 years 4 months ago
Feature Selection for High Dimensional Face Image Using Self-organizing Maps
: While feature selection is very difficult for high dimensional, unstructured data such as face image, it may be much easier to do if the data can be faithfully transformed into l...
Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Fuyan Zh...