Sciweavers

654 search results - page 38 / 131
» Mining the Most Interesting Rules
Sort
View
KDD
1999
ACM
237views Data Mining» more  KDD 1999»
15 years 4 months ago
Using Association Rules for Product Assortment Decisions: A Case Study
It has been claimed that the discovery of association rules is well-suited for applications of market basket analysis to reveal regularities in the purchase behaviour of customers...
Tom Brijs, Gilbert Swinnen, Koen Vanhoof, Geert We...
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 3 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
EVOW
2009
Springer
14 years 9 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
AIME
2009
Springer
14 years 9 months ago
Mining Safety Signals in Spontaneous Reports Database Using Concept Analysis
Abstract. In pharmacovigilance, linking the adverse reactions by patients to drugs they took is a key activity typically based on the analysis of patient reports. Yet generating po...
Mohamed Rouane Hacene, Yannick Toussaint, Petko Va...
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
15 years 4 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...