Sciweavers

1701 search results - page 182 / 341
» Providing k-anonymity in data mining
Sort
View
115
Voted
CIKM
2009
Springer
15 years 5 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
83
Voted
DIS
1999
Springer
15 years 2 months ago
Scheduled Discovery of Exception Rules
This paper shows preliminary results, on financial data, of an algorithm for discovering pairs of an exception rule and a common sense rule under a prespecified schedule. An exce...
Einoshin Suzuki
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
15 years 11 months ago
Co-evolution of social and affiliation networks
In our work, we address the problem of modeling social network generation which explains both link and group formation. Recent studies on social network evolution propose generati...
Elena Zheleva, Hossam Sharara, Lise Getoor
KDD
2002
ACM
166views Data Mining» more  KDD 2002»
15 years 10 months ago
Frequent term-based text clustering
Text clustering methods can be used to structure large sets of text or hypertext documents. The well-known methods of text clustering, however, do not really address the special p...
Florian Beil, Martin Ester, Xiaowei Xu
KDD
2002
ACM
125views Data Mining» more  KDD 2002»
15 years 10 months ago
Pattern discovery in sequences under a Markov assumption
In this paper we investigate the general problem of discovering recurrent patterns that are embedded in categorical sequences. An important real-world problem of this nature is mo...
Darya Chudova, Padhraic Smyth