Sciweavers

1701 search results - page 24 / 341
» Providing k-anonymity in data mining
Sort
View
JUCS
2008
125views more  JUCS 2008»
14 years 9 months ago
Improving AEH Courses through Log Analysis
: Authoring in adaptive educational hypermedia environment is complex activity. In order to promote a wider application of this technology, the teachers and course designers need s...
César Vialardi Sacín, Javier Bravo, ...
VLDB
1998
ACM
103views Database» more  VLDB 1998»
15 years 1 months ago
The Drill Down Benchmark
Data Mining places specific requirements on DBMS query performance that cannot be evaluated satisfactorily using existing OLAP benchmarks. The DD Benchmark - defined here - provid...
Peter A. Boncz, Tim Rühl, Fred Kwakkel
56
Voted
SIGKDD
2000
106views more  SIGKDD 2000»
14 years 9 months ago
Data Mining Models as Services on the Internet
The goal of this article is to raise a debate on the usefulness of providing data mining models as services on the internet. These services can be provided by anyone with adequate...
Sunita Sarawagi, Sree Hari Nagaralu
KDD
2007
ACM
137views Data Mining» more  KDD 2007»
15 years 10 months ago
Characterising the difference
Characterising the differences between two databases is an often occurring problem in Data Mining. Detection of change over time is a prime example, comparing databases from two b...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
85
Voted
IIWAS
2008
14 years 11 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang