Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,161,309 papers from all fields of science
Search
Sign In
Create Free Account
Data mining
Known as:
Pattern Mining
, Information mining
, Knowledge discovering in databases
Expand
Data mining is an interdisciplinary subfield of computer science. It is the computational process of discovering patterns in large data sets…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AI winter
Aleksandar Lazarevic
Artificial intelligence (video games)
Behavior informatics
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
Big Data Analysis and Mining
C. Leung
Advances in Computer and Electrical Engineering
2019
Corpus ID: 65164526
Big data analysis and mining aims to discover implicit, previously unknown, and potentially useful information and knowledge from…
Expand
Highly Cited
2009
Highly Cited
2009
Connected Vehicle Diagnostics and Prognostics, Concept, and Initial Practice
Yilu Zhang
,
G. W. Gantt
,
M. Rychlinski
,
R. Edwards
,
J. Correia
,
C. Wolf
IEEE Transactions on Reliability
2009
Corpus ID: 6355751
We propose a new concept of Connected Vehicle Diagnostics and Prognostics (CVDP) to address some of the challenges in vehicle…
Expand
Highly Cited
2009
Highly Cited
2009
QoS Based Power Aware Routing in MANETs
V. Rishiwal
,
S. Verma
,
S. Bajpai
2009
Corpus ID: 2814576
—In this paper, QoS based power aware routing protocol (Q-PAR) is proposed and evaluated that selects an energy stable QoS…
Expand
Review
2008
Review
2008
Data Mining for Business Intelligence
Magdalini Eirinaki
2008
Corpus ID: 192637899
Course Overview The rapid proliferation of the Internet and related technologies has created an unprecedented opportunity for…
Expand
Review
2007
Review
2007
Genetic Algorithm for framing rules for Intrusion Detection
Melanie Middlemiss
,
Grant Dick
2007
Corpus ID: 5067616
Summary With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer…
Expand
Highly Cited
2006
Highly Cited
2006
QRP05-4: Internet Traffic Identification using Machine Learning
Jeffrey Erman
,
A. Mahanti
,
M. Arlitt
IEEE Globecom
2006
Corpus ID: 335700
We apply an unsupervised machine learning approach for Internet traffic identification and compare the results with that of a…
Expand
Highly Cited
2005
Highly Cited
2005
Mining changes in association rules: a fuzzy approach
Wai-Ho Au
,
Keith C. C. Chan
Fuzzy Sets Syst.
2005
Corpus ID: 17845776
Highly Cited
2004
Highly Cited
2004
An intelligent recommender system using sequential Web access patterns
Baoyao Zhou
,
S. Hui
,
Kuiyu Chang
International Conference on Computational…
2004
Corpus ID: 15456241
To provide intelligent personalized online services such as Web recommendations, it is usually necessary to model users' Web…
Expand
Highly Cited
2000
Highly Cited
2000
Active Support Vector Machine Classification
O. Mangasarian
,
D. Musicant
Neural Information Processing Systems
2000
Corpus ID: 9050658
An active set strategy is applied to the dual of a simple reformulation of the standard quadratic program of a linear support…
Expand
Highly Cited
1986
Highly Cited
1986
Economic Incentives for Countertrade
R. Mirus
,
B. Yeung
1986
Corpus ID: 41054666
This paper examines countertrade using standard economic theory. We show that in many circumstances countertrade is a rational…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE