Sciweavers

1913 search results - page 63 / 383
» Using Data Mining in MURA Graphic Problems
Sort
View
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
16 years 4 months ago
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining
The randomized response (RR) technique is a promising technique to disguise private categorical data in Privacy-Preserving Data Mining (PPDM). Although a number of RR-based methods...
Zhengli Huang, Wenliang Du
150
Voted
BIS
2010
159views Business» more  BIS 2010»
14 years 10 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...
KDD
2003
ACM
170views Data Mining» more  KDD 2003»
16 years 3 months ago
Efficient decision tree construction on streaming data
Decision tree construction is a well studied problem in data mining. Recently, there has been much interest in mining streaming data. Domingos and Hulten have presented a one-pass...
Ruoming Jin, Gagan Agrawal
125
Voted
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
15 years 9 months ago
Discovering Frequent Arrangements of Temporal Intervals
In this paper we study a new problem in temporal pattern mining: discovering frequent arrangements of temporal intervals. We assume that the database consists of sequences of even...
Panagiotis Papapetrou, George Kollios, Stan Sclaro...
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 7 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan