![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Matrices, Compression, Learning Curves: Formulation, and the GroupNteach Algorithms
Suppose you are a teacher, and have to convey a set of object-property pairs (‘lions eat meat’). A good teacher will convey a lot of information, with little effort on the student side. What is the best and mo...
-
Chapter and Conference Paper
Mining Videos from the Web for Electronic Textbooks
We propose a system for mining videos from the web for supplementing the content of electronic textbooks in order to enhance their utility. Textbooks are generally organized into sections such that each sectio...
-
Chapter and Conference Paper
Electronic Textbooks and Data Mining
Education is known to be the key determinant of economic growth and prosperity [8,12]. While the issues in devising a high-quality educational system are multi-faceted and complex, textbooks are acknowledged t...
-
Chapter and Conference Paper
Enriching Education through Data Mining
Education is acknowledged to be the primary vehicle for improving the economic well-being of people [1,6]. Textbooks have a direct bearing on the quality of education imparted to the students as they are the p...
-
Chapter and Conference Paper
Enriching Education through Data Mining
Education is acknowledged to be the primary vehicle for improving the economic well-being of people [1,6]. Textbooks have a direct bearing on the quality of education imparted to the students as they are the p...
-
Article
Privacy-preserving indexing of documents on the network
With the ubiquitous collection of data and creation of large distributed repositories, enabling search over this data while respecting access control is critical. A related problem is that of ensuring privacy ...
-
Chapter and Conference Paper
On Honesty in Sovereign Information Sharing
We study the following problem in a sovereign information-sharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave honestly, even though they can benefit fro...
-
Article
Automatic Subspace Clustering of High Dimensional Data
Data mining applications place special requirements on clustering algorithms including: the ability to find clusters embedded in subspaces of high dimensional data, scalability, end-user comprehensibility of t...
-
Chapter and Conference Paper
Mining Information Extraction Rules from Datasheets Without Linguistic Parsing
In the context of the Pangea project at IBM, we needed to design an information extraction module in order to extract some information from datasheets. Contrary to several information extraction systems based ...
-
Chapter and Conference Paper
Data Privacy
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the techni...
-
Chapter and Conference Paper
An Implementation of P3P Using Database Technology
The privacy of personal information on the Internet has become a major concern for governments, businesses, media, and the public. Platform for Privacy Preferences (P3P), developed by the World Wide Web Consor...
-
Chapter and Conference Paper
Data Privacy
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the techni...
-
Article
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and delineate desirable properties ...
-
Article
Constraint-Based Rule Mining in Large, Dense Databases
Constraint-based rule miners find all rules in a given data-set meeting user-specified constraints such as minimum support and confidence. We describe a new algorithm that directly exploits all user-specified ...
-
Article
Integrating Association Rule Mining with Relational Database Systems: Alternatives and Implications
Data mining on large data warehouses is becoming increasingly important. In support of this trend, we consider a spectrum of architectural alternatives for coupling mining with database systems. These alternat...
-
Chapter and Conference Paper
Athena: Mining-Based Interactive Management of Text Databases
We describe Athena: a system for creating, exploiting, and maintaining a hierarchy of textual documents through interactive miningbased operations. Requirements of any such system include speed and minimal end...
-
Article
Scalable feature selection, classification and signature generation for organizing large text databases into hierarchical topic taxonomies
We explore how to organize large text databases hierarchically by topic to aid better searching, browsing and filtering. Many corpora, such as internet directories, digital libraries, and patent databases are...
-
Chapter and Conference Paper
Mining process models from workflow logs
Modern enterprises increasingly use the workflow paradigm to prescribe how business processes should be performed. Processes are typically modeled as annotated activity graphs. We present an approach for a sys...
-
Chapter and Conference Paper
Discovery-driven exploration of OLAP data cubes
Analysts predominantly use OLAP data cubes to identify regions of anomalies that may represent problem areas or new opportunities. The current OLAP systems support hypothesis-driven exploration of data cubes t...
-
Chapter and Conference Paper
SLIQ: A fast scalable classifier for data mining
Classification is an important problem in the emerging field of data mining. Although classification has been studied extensively in the past, most of the classification algorithms are designed only for memory...