Sciweavers

2049 search results - page 86 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
DAWAK
2008
Springer
15 years 6 months ago
Mining Conditional Cardinality Patterns for Data Warehouse Query Optimization
Abstract. Data mining algorithms are often embedded in more complex systems, serving as the provider of data for internal decision making within these systems. In this paper we add...
Mikolaj Morzy, Marcin Krystek
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
15 years 10 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
JIIS
2002
130views more  JIIS 2002»
15 years 3 months ago
Image Mining: Trends and Developments
Advances in image acquisition and storage technology have led to tremendous growth in very large and detailed image databases. These images, if analyzed, can reveal useful informa...
Wynne Hsu, Mong-Li Lee, Ji Zhang
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 10 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
KDD
1995
ACM
248views Data Mining» more  KDD 1995»
15 years 7 months ago
Data Mining for Loan Evaluation at ABN AMRO: A Case Study
Wedescribe a case study in data miningfor personal loan evaluation, performed at the ABNAMRObank in the Netherlands. Historical data of clients and their pay-backbehaviourare used...
A. J. Feelders, A. J. F. le Loux, J. W. van't Zand