Sciweavers

2049 search results - page 49 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
DKE
2006
84views more  DKE 2006»
15 years 4 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...
134
Voted
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
15 years 3 months ago
Quantitative Forecasting and Assessment Models in the State Education System
This paper presents model-based forecasting of the Lithuanian education system in the period of 2001
Vydunas Saltenis, Gintautas Dzemyda, Vytautas Ties...
WSDM
2010
ACM
129views Data Mining» more  WSDM 2010»
16 years 1 months ago
Early Exit Optimizations for Additive Machine Learned Ranking Systems
Berkant Barla Cambazoglu, Hugo Zaragoza, Olivier C...
KDD
2010
ACM
182views Data Mining» more  KDD 2010»
15 years 8 months ago
Extracting temporal signatures for comprehending systems biology models
Naren Sundaravaradan, K. S. M. Tozammel Hossain, V...
ISI
2005
Springer
15 years 9 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang