Sciweavers

1400 search results - page 258 / 280
» Post-Analysis of Learned Rules
Sort
View
130
Voted
PAKDD
2001
ACM
157views Data Mining» more  PAKDD 2001»
15 years 6 months ago
Applying Pattern Mining to Web Information Extraction
Information extraction (IE) from semi-structured Web documents is a critical issue for information integration systems on the Internet. Previous work in wrapper induction aim to so...
Chia-Hui Chang, Shao-Chen Lui, Yen-Chin Wu
131
Voted
SCCC
2000
IEEE
15 years 6 months ago
A Genetic Classifier Tool
Knowledge discovery is the most desirable end product of an enterprise information system. Researches from different areas recognize that a new generation of intelligent tools for...
Aurora T. R. Pozo, Mozart Hasse
118
Voted
ECAI
2000
Springer
15 years 6 months ago
Data Set Editing by Ordered Projection
In this paper, an editing algorithm based on the projection of the examples in each dimension is presented. The algorithm, that we have called EOP (Editing by Ordered Projection) h...
Jesús S. Aguilar-Ruiz, José Crist&oa...
HIPC
1999
Springer
15 years 6 months ago
High Performance Data Mining
Abstract. Recent times have seen an explosive growth in the availability of various kinds of data. It has resulted in an unprecedented opportunity to develop automated data-driven ...
Vipin Kumar, Jaideep Srivastava
106
Voted
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 6 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok