Sciweavers

1701 search results - page 193 / 341
» Providing k-anonymity in data mining
Sort
View
78
Voted
ADMA
2008
Springer
123views Data Mining» more  ADMA 2008»
15 years 4 months ago
Supporting Customer Retention through Real-Time Monitoring of Individual Web Usage
Customer retention is crucial for any company relying on a regular client base. One way to approach this problem is to analyse actual user behaviour and take proper actions based o...
Peter Hofgesang, Jan Peter Patist
ICDM
2003
IEEE
158views Data Mining» more  ICDM 2003»
15 years 3 months ago
Combining Multiple Weak Clusterings
A data set can be clustered in many ways depending on the clustering algorithm employed, parameter settings used and other factors. Can multiple clusterings be combined so that th...
Alexander P. Topchy, Anil K. Jain, William F. Punc...
67
Voted
AUSDM
2006
Springer
82views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Generality Is Predictive of Prediction Accuracy
During knowledge acquisition multiple alternative potential rules all appear equally credible. This paper addresses the dearth of formal analysis about how to select between such a...
Geoffrey I. Webb, Damien Brain
80
Voted
KDD
1995
ACM
173views Data Mining» more  KDD 1995»
15 years 1 months ago
Knowledge Discovery in Textual Databases (KDT)
The information age is characterizedby a rapid growth in the amountof information availablein electronicmedia. Traditional data handling methods are not adequate to cope with this...
Ronen Feldman, Ido Dagan
89
Voted
SDM
2007
SIAM
133views Data Mining» more  SDM 2007»
14 years 11 months ago
On Point Sampling Versus Space Sampling for Dimensionality Reduction
In recent years, random projection has been used as a valuable tool for performing dimensionality reduction of high dimensional data. Starting with the seminal work of Johnson and...
Charu C. Aggarwal