Sciweavers

7163 search results - page 219 / 1433
» Privacy-Preserving Data Mining
Sort
View
KDD
2006
ACM
107views Data Mining» more  KDD 2006»
16 years 5 months ago
Out-of-core frequent pattern mining on a commodity PC
In this work we focus on the problem of frequent itemset mining on large, out-of-core data sets. After presenting a characterization of existing out-of-core frequent itemset minin...
Gregory Buehrer, Srinivasan Parthasarathy, Amol Gh...
DMKD
2004
ACM
167views Data Mining» more  DMKD 2004»
15 years 10 months ago
FP-tax: tree structure based generalized association rule mining
Data mining has been widely recognized as a powerful tool to explore added value from large-scale databases. One of data mining techniques, generalized association rule mining wit...
Iko Pramudiono, Masaru Kitsuregawa
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
15 years 10 months ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang
FLAIRS
2001
15 years 6 months ago
Data Mining with Distributed Agents in E-Commerce Applications
In this paperwedescribe the prototypeof a yellowpageservice for customersin a distributed cyber-shoppingmall. This application combines distributed data miningwith agent technolog...
Yugyung Lee, James Geller, Eun Kyo Park, Changgyu ...
EDM
2008
288views Data Mining» more  EDM 2008»
15 years 6 months ago
Data Mining Algorithms to Classify Students
In this paper we compare different data mining methods and techniques for classifying students based on their Moodle usage data and the final marks obtained in their respective cou...
Cristóbal Romero, Sebastián Ventura,...