Sciweavers

773 search results - page 50 / 155
» Mining taxonomies of process models
Sort
View
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 1 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
KDD
2008
ACM
115views Data Mining» more  KDD 2008»
16 years 7 days ago
SPIRAL: efficient and exact model identification for hidden Markov models
Hidden Markov models (HMMs) have received considerable attention in various communities (e.g, speech recognition, neurology and bioinformatic) since many applications that use HMM...
Yasuhiro Fujiwara, Yasushi Sakurai, Masashi Yamamu...
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 5 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
16 years 7 days ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...
DEEC
2006
IEEE
15 years 3 months ago
A Bottom-Up Workflow Mining Approach for Workflow Applications Analysis
Abstract. Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interac...
Walid Gaaloul, Karim Baïna, Claude Godart