Sciweavers

1701 search results - page 205 / 341
» Providing k-anonymity in data mining
Sort
View
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
15 years 5 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
66
Voted
ICDM
2009
IEEE
97views Data Mining» more  ICDM 2009»
15 years 4 months ago
Hierarchical Probabilistic Segmentation of Discrete Events
—Segmentation, the task of splitting a long sequence of discrete symbols into chunks, can provide important information about the nature of the sequence that is understandable to...
Guy Shani, Christopher Meek, Asela Gunawardana
84
Voted
DAWAK
2007
Springer
15 years 4 months ago
OLAP Technology for Business Process Intelligence: Challenges and Solutions
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl
KDD
1995
ACM
108views Data Mining» more  KDD 1995»
15 years 1 months ago
A Statistical Perspective On Knowledge Discovery In Databases
The quest to nd models usefully characterizing data is a process central to the scienti c method, and has been carried out on many fronts. Researchers from an expanding number of ...
John F. Elder IV, Daryl Pregibon
VLDB
2002
ACM
264views Database» more  VLDB 2002»
14 years 9 months ago
Viator - A Tool Family for Graphical Networking and Data View Creation
Web-based data sources, particularly in Life Sciences, grow in diversity and volume. Most of the data collections are equipped with common document search, hyperlink and retrieval...
Stephan Heymann, Katja Tham, Axel Kilian, Gunnar W...