Sciweavers

1701 search results - page 104 / 341
» Providing k-anonymity in data mining
Sort
View
CCS
2009
ACM
15 years 4 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
CAISE
2004
Springer
15 years 3 months ago
Business Alignment: Using Process Mining as a Tool for Delta Analysis
Fueled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area. Until rece...
Wil M. P. van der Aalst
APWEB
2006
Springer
15 years 1 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa
BPM
2008
Springer
192views Business» more  BPM 2008»
14 years 12 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....
KDD
2002
ACM
145views Data Mining» more  KDD 2002»
15 years 10 months ago
Handling very large numbers of association rules in the analysis of microarray data
The problem of analyzing microarray data became one of important topics in bioinformatics over the past several years, and different data mining techniques have been proposed for ...
Alexander Tuzhilin, Gediminas Adomavicius