Sciweavers

11436 search results - page 1947 / 2288
» Modeling Real Reasoning
Sort
View
KDD
2007
ACM
137views Data Mining» more  KDD 2007»
16 years 5 months ago
Characterising the difference
Characterising the differences between two databases is an often occurring problem in Data Mining. Detection of change over time is a prime example, comparing databases from two b...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
KDD
2005
ACM
160views Data Mining» more  KDD 2005»
16 years 5 months ago
Optimizing time series discretization for knowledge discovery
Knowledge Discovery in time series usually requires symbolic time series. Many discretization methods that convert numeric time series to symbolic time series ignore the temporal ...
Alfred Ultsch, Fabian Mörchen
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 5 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
16 years 5 months ago
Regularized multi--task learning
Past empirical work has shown that learning multiple related tasks from data simultaneously can be advantageous in terms of predictive performance relative to learning these tasks...
Theodoros Evgeniou, Massimiliano Pontil
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 5 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
« Prev « First page 1947 / 2288 Last » Next »