Sciweavers

2049 search results - page 271 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu
AAAI
1996
15 years 19 days ago
Post-Analysis of Learned Rules
Rule induction research implicitly assumes that after producing the rules from a dataset, these rules will be used directly by an expert system or a human user. In real-life appli...
Bing Liu, Wynne Hsu
EDBT
2008
ACM
178views Database» more  EDBT 2008»
15 years 11 months ago
An inductive database and query language in the relational model
In the demonstration, we will present the concepts and an implementation of an inductive database ? as proposed by Imielinski and Mannila ? in the relational model. The goal is to...
Lothar Richter, Jörg Wicker, Kristina Kessler...
EDM
2009
175views Data Mining» more  EDM 2009»
14 years 9 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 9 months ago
Analyzing Abnormal Events from Spatio-temporal Trajectories
Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is capture...
Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong-Li L...