Sciweavers

1701 search results - page 92 / 341
» Providing k-anonymity in data mining
Sort
View
DKE
2007
115views more  DKE 2007»
14 years 10 months ago
An improved methodology on information distillation by mining program source code
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
Yiannis Kanellopoulos, Christos Makris, Christos T...
WWW
2005
ACM
15 years 10 months ago
Web log mining with adaptive support thresholds
With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are bas...
Jian Chih Ou, Chang-Hung Lee, Ming-Syan Chen
ADMI
2010
Springer
14 years 9 months ago
Real-Time Sensory Pattern Mining for Autonomous Agents
Abstract. Autonomous agents are systems situated in dynamic environments. They pursue goals and satisfy their needs by responding to external events from the environment. In these ...
Pedro Sequeira, Cláudia Antunes
ICPR
2010
IEEE
15 years 1 months ago
Underwater Mine Classification with Imperfect Labels
A new algorithm for performing classification with imperfectly labeled data is presented. The proposed approach is motivated by the insight that the average prediction of a group ...
David Williams
EDM
2009
147views Data Mining» more  EDM 2009»
14 years 7 months ago
Using Dirichlet priors to improve model parameter plausibility
Student modeling is a widely used approach to make inference about a student's attributes like knowledge, learning, etc. If we wish to use these models to analyze and better u...
Dovan Rai, Yue Gong, Joseph Beck