Sciweavers

2049 search results - page 281 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
DAWAK
2007
Springer
15 years 5 months ago
OLAP Technology for Business Process Intelligence: Challenges and Solutions
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 4 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
DKE
2002
218views more  DKE 2002»
14 years 11 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 9 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
SCAM
2007
IEEE
15 years 5 months ago
A Framework for Studying Clones In Large Software Systems
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the ...
Zhen Ming Jiang, Ahmed E. Hassan