Sciweavers

1701 search results - page 80 / 341
» Providing k-anonymity in data mining
Sort
View
ICDM
2007
IEEE
186views Data Mining» more  ICDM 2007»
15 years 4 months ago
Mining Interpretable Human Strategies: A Case Study
This paper focuses on mining human strategies by observing their actions. Our application domain is an HCI study aimed at discovering general strategies used by software users and...
Xiaoli Z. Fern, Chaitanya Komireddy, Margaret M. B...
SDM
2009
SIAM
215views Data Mining» more  SDM 2009»
15 years 7 months ago
Hybrid Clustering of Text Mining and Bibliometrics Applied to Journal Sets.
To obtain correlated and complementary information contained in text mining and bibliometrics, hybrid clustering to incorporate textual content and citation information has become...
Bart De Moor, Frizo A. L. Janssens, Shi Yu, Wolfga...
AINA
2006
IEEE
15 years 4 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
76
Voted
DAWAK
2007
Springer
15 years 4 months ago
Domination Mining and Querying
Abstract. Pareto dominance plays an important role in diverse application domains such as economics and e-commerce, and it is widely being used in multicriteria decision making. In...
Apostolos N. Papadopoulos, Apostolos Lyritsis, Ale...
AUSDM
2007
Springer
161views Data Mining» more  AUSDM 2007»
15 years 4 months ago
A Case Study of Failure Mode Analysis with Text Mining Methods
The maintenance dataset provided by SunWater contains information about failed assets also known as components and their corresponding failure modes. Currently, extraction of this...
Lin Chen, Richi Nayak