Sciweavers

1701 search results - page 122 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2008
ACM
246views Data Mining» more  KDD 2008»
15 years 10 months ago
Direct mining of discriminative and essential frequent patterns via model-based search tree
Frequent patterns provide solutions to datasets that do not have well-structured feature vectors. However, frequent pattern mining is non-trivial since the number of unique patter...
Wei Fan, Kun Zhang, Hong Cheng, Jing Gao, Xifeng Y...
BIBM
2007
IEEE
159views Bioinformatics» more  BIBM 2007»
15 years 4 months ago
Predicting Future High-Cost Patients: A Real-World Risk Modeling Application
Health care data from patients in the Arizona Health Care Cost Containment System, Arizona’s Medicaid program, provides a unique opportunity to exploit state-of-the-art data pro...
Sai T. Moturu, William G. Johnson, Huan Liu
CASDMKM
2004
Springer
131views Data Mining» more  CASDMKM 2004»
15 years 3 months ago
XML-Based Schemes for Business Project Portfolio Selection
Abstract. Many methodologies have been introduced to deal with project portfolio selection problem including some techniques that help to evaluate individual projects, or to select...
Jichang Dong, Kin Keung Lai, Shouyang Wang
SDM
2010
SIAM
195views Data Mining» more  SDM 2010»
14 years 11 months ago
MACH: Fast Randomized Tensor Decompositions
Tensors naturally model many real world processes which generate multi-aspect data. Such processes appear in many different research disciplines, e.g, chemometrics, computer visio...
Charalampos E. Tsourakakis
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
15 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...