Sciweavers

2049 search results - page 49 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
DKE
2006
84views more  DKE 2006»
14 years 11 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
14 years 10 months ago
Quantitative Forecasting and Assessment Models in the State Education System
This paper presents model-based forecasting of the Lithuanian education system in the period of 2001
Vydunas Saltenis, Gintautas Dzemyda, Vytautas Ties...
WSDM
2010
ACM
129views Data Mining» more  WSDM 2010»
15 years 8 months ago
Early Exit Optimizations for Additive Machine Learned Ranking Systems
Berkant Barla Cambazoglu, Hugo Zaragoza, Olivier C...
KDD
2010
ACM
182views Data Mining» more  KDD 2010»
15 years 2 months ago
Extracting temporal signatures for comprehending systems biology models
Naren Sundaravaradan, K. S. M. Tozammel Hossain, V...
ISI
2005
Springer
15 years 4 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang