Sciweavers

1701 search results - page 28 / 341
» Providing k-anonymity in data mining
Sort
View
CBMS
2007
IEEE
15 years 4 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
JMLR
2010
145views more  JMLR 2010»
14 years 4 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
JDWM
2008
97views more  JDWM 2008»
14 years 9 months ago
Seismological Data Warehousing and Mining: A Survey
Earthquake data composes an ever increasing collection of earth science information for post-processing analysis. Earth scientists, local or national administration officers and s...
Gerasimos Marketos, Yannis Theodoridis, Ioannis S....
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
15 years 2 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
74
Voted
DAWAK
2003
Springer
15 years 2 months ago
Automatic Detection of Structural Changes in Data Warehouses
Data Warehouses provide sophisticated tools for analyzing complex data online, in particular by aggregating data along dimensions spanned by master data. Changes to these master da...
Johann Eder, Christian Koncilia, Dieter Mitsche