Sciweavers

2049 search results - page 285 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
IAJIT
2010
155views more  IAJIT 2010»
14 years 8 months ago
Evaluation of text clustering methods using wordnet
: The increasing number of digitized texts presently available notably on the Web has developed an acute need in text mining techniques. Clustering systems are used more and more o...
Abdelmalek Amine, Zakaria Elberrichi, Michel Simon...
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
15 years 11 months ago
Automatic identification of quasi-experimental designs for discovering causal knowledge
Researchers in the social and behavioral sciences routinely rely on quasi-experimental designs to discover knowledge from large databases. Quasi-experimental designs (QEDs) exploi...
David D. Jensen, Andrew S. Fast, Brian J. Taylor, ...
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
15 years 3 months ago
Aggregation of Imprecise and Uncertain Information for Knowledge Discovery in Databases
We consider the problem of aggregation for uncertain and imprecise data. For such data, we define aggregation operators and use them to provide information on properties and patte...
Sally I. McClean, Bryan W. Scotney, Mary Shapcott
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 11 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
15 years 11 months ago
Nantonac collaborative filtering: recommendation based on order responses
A recommender system suggests the items expected to be preferred by the users. Recommender systems use collaborative filtering to recommend items by summarizing the preferences of...
Toshihiro Kamishima