Sciweavers

2049 search results - page 87 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
BIS
2010
159views Business» more  BIS 2010»
14 years 6 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...
KDD
1998
ACM
136views Data Mining» more  KDD 1998»
15 years 3 months ago
Integrating Classification and Association Rule Mining
Classification rule mining aims to discover a small set of rules in the database that forms an accurate classifier. Association rule mining finds all the rules existing in the dat...
Bing Liu, Wynne Hsu, Yiming Ma
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 2 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
ISORC
2000
IEEE
15 years 3 months ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
ICDM
2007
IEEE
301views Data Mining» more  ICDM 2007»
15 years 3 months ago
Stream Event Detection: A Unified Framework for Mining Outlier, Change and Burst Simultaneously over Data Stream
Event detection is one of the most important issues of event processing system, especially Complex Event Processing (CEP). Outlier event, change event and burst event are three ty...
Zhijian Yuan, Kai Du, Yan Jia, Jiajia Miao