Sciweavers

2049 search results - page 129 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
PKDD
2000
Springer
108views Data Mining» more  PKDD 2000»
15 years 2 months ago
Application of Reinforcement Learning to Electrical Power System Closed-Loop Emergency Control
This paper investigates the use of reinforcement learning in electric power system emergency control. The approach consists of using numerical simulations together with on-policy M...
Christophe Druet, Damien Ernst, Louis Wehenkel
ACL
2012
13 years 1 months ago
Social Event Radar: A Bilingual Context Mining and Sentiment Analysis Summarization System
Social Event Radar is a new social networking-based service platform, that aim to alert as well as monitor any merchandise flaws, food-safety related issues, unexpected eruption o...
Wen-Tai Hsieh, Chen Ming Wu, Tsun Ku, Seng-cho Tim...
BNCOD
2003
127views Database» more  BNCOD 2003»
15 years 18 days ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy
SACMAT
2010
ACM
14 years 9 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
IDEAS
2003
IEEE
106views Database» more  IDEAS 2003»
15 years 4 months ago
Frequent Itemsets Mining for Database Auto-Administration
With the wide development of databases in general and data warehouses in particular, it is important to reduce the tasks that a database administrator must perform manually. The a...
Kamel Aouiche, Jérôme Darmont, Le Gru...