The common approach to exploit mining constraints is to push them deeply into the mining algorithms. In our paper we argue that this approach is based on an understanding of KDD …
X Chen, I Petrounias - International Conference on Database and Expert …, 1998 - Springer
Time is an important aspect of all real world phenomena. Any systems, approaches or techniques that are concerned with information need to take into account the temporal …
K Zhao, B Liu, TM Tirpak, W Xiao - Fifth IEEE International …, 2005 - ieeexplore.ieee.org
Data mining algorithms usually generate a large number of rules, which may not always be useful to human users. In this project, we propose a novel visual data-mining framework …
There is a massive increase of information available on electronic networks. This profusion of resources on the World-Wide Web gave rise to considerable interest in the research …
X Shang, KU Sattler, I Geist - International Conference on Applications of …, 2004 - Springer
Scalable data mining in large databases is one of today's real challenges to database research area. The integration of data mining with database systems is an essential …
Information overloading is today a serious concern that may hinder the potential of modern web-based information systems. A promising approach to deal with this problem is …
H Wang, C Zaniolo - Proceedings of the 2003 SIAM International …, 2003 - SIAM
A lack of power and extensibility in their query languages has seriously limited the generality of DBMSs and hampered their ability to support data mining applications. Thus, there is a …
Many pattern mining systems are designed to solve one specific problem, such as frequent, closed or maximal frequent itemset mining, efficiently. Even though efficient, their …
We investigate ways to support interactive mining sessions, in the setting of association rule mining. In such sessions, users specify conditions (filters) on the associations to be …