Sciweavers

654 search results - page 104 / 131
» Mining the Most Interesting Rules
Sort
View
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
16 years 1 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
PERCOM
2003
ACM
15 years 11 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 5 days ago
Support envelopes: a technique for exploring the structure of association patterns
This paper introduces support envelopes--a new tool for analyzing association patterns--and illustrates some of their properties, applications, and possible extensions. Specifical...
Michael Steinbach, Pang-Ning Tan, Vipin Kumar
80
Voted
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
16 years 5 days ago
Detecting anomalous records in categorical datasets
We consider the problem of detecting anomalies in high arity categorical datasets. In most applications, anomalies are defined as data points that are 'abnormal'. Quite ...
Kaustav Das, Jeff G. Schneider
KDD
2003
ACM
109views Data Mining» more  KDD 2003»
16 years 5 days ago
Experimental design for solicitation campaigns
Data mining techniques are routinely used by fundraisers to select those prospects from a large pool of candidates who are most likely to make a financial contribution. These tech...
Uwe F. Mayer, Armand Sarkissian