Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
This paper presents an interactive query expansion method with association thesaurus, which is mined from the ‘selected web pages’ of users in the query logs. The ‘selected w...
Discovering hidden patterns in large sets of workforce schedules to gain insight into the potential knowledge in workforce schedules are crucial to better understanding the workfor...
We are given a large database of customer transactions. Each transaction consists of items purchased by a customer in a visit. We present an e cient algorithm that generates all s...
— This paper presents clustering techniques (K-means, Fuzzy K-means, Subtractive) applied on specific databases (Flower Classification and Mackey-Glass time series) , to automati...
Juan E. Moreno, Oscar Castillo, Juan R. Castro, Lu...