![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Matrices, Compression, Learning Curves: Formulation, and the GroupNteach Algorithms
Suppose you are a teacher, and have to convey a set of object-property pairs (‘lions eat meat’). A good teacher will convey a lot of information, with little effort on the student side. What is the best and mo...
-
Chapter and Conference Paper
Electronic Textbooks and Data Mining
Education is known to be the key determinant of economic growth and prosperity [8,12]. While the issues in devising a high-quality educational system are multi-faceted and complex, textbooks are acknowledged t...
-
Chapter and Conference Paper
Enriching Education through Data Mining
Education is acknowledged to be the primary vehicle for improving the economic well-being of people [1,6]. Textbooks have a direct bearing on the quality of education imparted to the students as they are the p...
-
Chapter and Conference Paper
Enriching Education through Data Mining
Education is acknowledged to be the primary vehicle for improving the economic well-being of people [1,6]. Textbooks have a direct bearing on the quality of education imparted to the students as they are the p...
-
Chapter and Conference Paper
On Honesty in Sovereign Information Sharing
We study the following problem in a sovereign information-sharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave honestly, even though they can benefit fro...
-
Article
Automatic Subspace Clustering of High Dimensional Data
Data mining applications place special requirements on clustering algorithms including: the ability to find clusters embedded in subspaces of high dimensional data, scalability, end-user comprehensibility of t...
-
Chapter and Conference Paper
An Implementation of P3P Using Database Technology
The privacy of personal information on the Internet has become a major concern for governments, businesses, media, and the public. Platform for Privacy Preferences (P3P), developed by the World Wide Web Consor...
-
Chapter and Conference Paper
Data Privacy
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the techni...
-
Chapter and Conference Paper
Trust Management for the Semantic Web
Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the Semantic Web is a large, uncensored system to whic...
-
Article
Constraint-Based Rule Mining in Large, Dense Databases
Constraint-based rule miners find all rules in a given data-set meeting user-specified constraints such as minimum support and confidence. We describe a new algorithm that directly exploits all user-specified ...
-
Article
Integrating Association Rule Mining with Relational Database Systems: Alternatives and Implications
Data mining on large data warehouses is becoming increasingly important. In support of this trend, we consider a spectrum of architectural alternatives for coupling mining with database systems. These alternat...
-
Chapter and Conference Paper
Athena: Mining-Based Interactive Management of Text Databases
We describe Athena: a system for creating, exploiting, and maintaining a hierarchy of textual documents through interactive miningbased operations. Requirements of any such system include speed and minimal end...
-
Chapter and Conference Paper
SLIQ: A fast scalable classifier for data mining
Classification is an important problem in the emerging field of data mining. Although classification has been studied extensively in the past, most of the classification algorithms are designed only for memory...
-
Chapter and Conference Paper
Mining sequential patterns: Generalizations and performance improvements
The problem of mining sequential patterns was recently introduced in [3]. We are given a database of sequences, where each sequence is a list of transactions ordered by transaction-time, and each transaction i...
-
Chapter and Conference Paper
Recovery algorithms for database machines with non-volatile main memory
We consider a hypothetical database machine in which the main memory is non-volatile, and present recovery algorithms for such a machine. These algorithms are considerably simpler and more efficient than class...
-
Chapter
A Parallel Logging Algorithm for Multiprocessor Database Machines
During the past decade, a number of database tnachine designs have been proposed. However, these designs have been optitnized only with respect to the retrieval queries, and virtually no attention has been giv...