Sciweavers

2049 search results - page 141 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
CORR
2010
Springer
194views Education» more  CORR 2010»
14 years 8 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
GECCO
2003
Springer
322views Optimization» more  GECCO 2003»
15 years 4 months ago
AntClust: Ant Clustering and Web Usage Mining
Abstract. In this paper, we propose a new ant-based clustering algorithm called AntClust. It is inspired from the chemical recognition system of ants. In this system, the continuou...
Nicolas Labroche, Nicolas Monmarché, Gilles...
FLAIRS
2008
15 years 1 months ago
Semi-Automatic Refinement and Assessment of Subgroup Patterns
This paper presents a methodological approach for the semiautomatic refinement and assessment of subgroup patterns using summarization and clustering techniques in the context of ...
Martin Atzmüller, Frank Puppe
ICDM
2010
IEEE
137views Data Mining» more  ICDM 2010»
14 years 9 months ago
Automated Prompting in a Smart Home Environment
With more older adults and people with cognitive disorders preferring to stay independently at home, prompting systems that assist with Activities of Daily Living (ADLs) are in
Barnan Das, Chao Chen, Nairanjana Dasgupta, Diane ...
JCP
2006
173views more  JCP 2006»
14 years 11 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar