Sciweavers

2049 search results - page 124 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
IJAR
2011
118views more  IJAR 2011»
14 years 2 months ago
A sequential pattern mining algorithm using rough set theory
Sequential pattern mining is a crucial but challenging task in many applications, e.g., analyzing the behaviors of data in transactions and discovering frequent patterns in time se...
Ken Kaneiwa, Yasuo Kudo
112
Voted
GRC
2010
IEEE
15 years 8 days ago
Local Pattern Mining from Sequences Using Rough Set Theory
Abstract--Sequential pattern mining is a crucial but challenging task in many applications, e.g., analyzing the behaviors of data in transactions and discovering frequent patterns ...
Ken Kaneiwa, Yasuo Kudo
90
Voted
AMINING
2003
Springer
261views Data Mining» more  AMINING 2003»
15 years 4 months ago
Micro View and Macro View Approaches to Discovered Rule Filtering
A data mining system can semi-automatically discover knowledge by mining a large volume of data, but the discovered knowledge is not always novel and may contain unreasonable facts...
Yasuhiko Kitamura, Akira Iida, Keunsik Park
ATAL
2005
Springer
15 years 4 months ago
Implicit: an agent-based recommendation system for web search
The number of web pages available on Internet increases day after day, and consequently finding relevant information becomes more and more a hard task. However, when we consider ...
Aliaksandr Birukou, Enrico Blanzieri, Paolo Giorgi...
KES
2005
Springer
15 years 4 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel