Sciweavers

1701 search results - page 98 / 341
» Providing k-anonymity in data mining
Sort
View
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 4 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
VLDB
2004
ACM
245views Database» more  VLDB 2004»
15 years 3 months ago
VizTree: a Tool for Visually Mining and Monitoring Massive Time Series Databases
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
MSR
2006
ACM
15 years 3 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...
ESEM
2007
ACM
14 years 11 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...
KDID
2003
93views Database» more  KDID 2003»
14 years 11 months ago
A Framework for Frequent Sequence Mining under Generalized Regular Expression Constraints
This paper provides a framework for the extraction of frequent sequences satisfying a given regular expression (RE) constraint. We take advantage of the information contained in th...
Hunor Albert-Lorincz, Jean-François Boulica...