Sciweavers

1701 search results - page 133 / 341
» Providing k-anonymity in data mining
Sort
View
HICSS
2000
IEEE
155views Biometrics» more  HICSS 2000»
15 years 2 months ago
Mining Time Dependency Patterns in Clinical Pathways
Clinical pathways are widely adopted by many large hospitals around the world in order to provide high-quality patient treatment and reduce the length of hospital stay of each pat...
Fu-ren Lin, Shien-chao Chou, Shung-mei Pan, Yao-me...
APWEB
2003
Springer
15 years 1 months ago
Mining "Hidden Phrase" Definitions from the Web
Keyword searching is the most common form of document search on the Web. Many Web publishers manually annotate the META tags and titles of their pages with frequently queried phras...
Hung V. Nguyen, P. Velamuru, Deepak Kolippakkam, H...
JSS
2007
88views more  JSS 2007»
14 years 10 months ago
SQUIRE: Sequential pattern mining with quantities
Discovering sequential patterns is an important problem for many applications. Existing algorithms find qualitative sequential patterns in the sense that only items are included ...
Chulyun Kim, Jong-Hwa Lim, Raymond T. Ng, Kyuseok ...
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
15 years 4 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
APWEB
2005
Springer
15 years 3 months ago
Mining Quantitative Associations in Large Database
Association Rule Mining algorithms operate on a data matrix to derive association rule, discarding the quantities of the items, which contains valuable information. In order to mak...
Chenyong Hu, Yongji Wang, Benyu Zhang, Qiang Yang,...