Skip to search formSkip to main contentSkip to account menu

SIGKDD

Known as: Conference on Knowledge Discovery and Data Mining, KDD Conference 
SIGKDD is the Association for Computing Machinery's (ACM) Special Interest Group (SIG) on Knowledge Discovery and Data Mining. It became an official… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Maximal clique enumeration is a fundamental problem in graph theory and has been extensively studied. However, maximal clique… 
Highly Cited
2014
Highly Cited
2014
Intrusion is the violation of information security policy by malicious activities. Intrusion detection (ID) is a series of… 
Review
2014
Review
2014
While the amount of knowledge available as linked data grows, so does the need for providing end users with access to this… 
Highly Cited
2009
Highly Cited
2009
Graphs or networks can be used to model complex systems. Detecting community structures from large network data is a classic and… 
Highly Cited
2007
Highly Cited
2007
This chapter presents an innovative approach for performing data mining on documents, which serves as a basis for knowledge… 
Review
2005
Review
2005
Cleansing data from impurities is an integral part of data processing and maintenance. This has lead to the development of a… 
Highly Cited
2005
Highly Cited
2005
In the Internet, proxy servers play the key roles between users and Web sites, which could reduce the response time of user… 
Highly Cited
2004
Highly Cited
2004
Typical association rules consider only items enumerated in transactions. Such rules are referred to as positive association… 
Review
2003
Review
2003
Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and… 
Highly Cited
1997
Highly Cited
1997
There is a wealth of information to be mined from narrative text on the World Wide Web. Unfortunately, standard natural language…