메뉴 건너뛰기




Volumn 20, Issue 2, 2007, Pages 169-177

An extended process model of knowledge discovery in database

Author keywords

Databases; Process planning

Indexed keywords


EID: 33847000928     PISSN: 17410398     EISSN: None     Source Type: Journal    
DOI: 10.1108/17410390710725751     Document Type: Article
Times cited : (18)

References (16)
  • 1
    • 0001896313 scopus 로고    scopus 로고
    • The process of knowledge discovery in databases: A human-centered approach
    • AAAI/MIT Press Menlo Park, CA/Cambridge, MA
    • Brachman, R.J. and Anand, T. (1996), "The process of knowledge discovery in databases: a human-centered approach", Advance in Knowledge Discovery and Data Mining, AAAI/MIT Press, Menlo Park, CA/Cambridge, MA, pp. 33-58.
    • (1996) Advance in Knowledge Discovery and Data Mining , pp. 33-58
    • Brachman, R.J.1    Anand, T.2
  • 3
    • 0030285403 scopus 로고    scopus 로고
    • The KDO process for extracting useful knowledge from volumes of data
    • Fayyad, U., Piatetsky-Shapiro, G. and Smyth, P. (1996), "The KDO process for extracting useful knowledge from volumes of data", Communications of the ACM, Vol. 39 No. 11, pp. 27-34.
    • (1996) Communications of the ACM , vol.39 , Issue.11 , pp. 27-34
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 6
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Kemmerer, R.A. and Vigna, G. (2002), "Intrusion detection: a brief history and overview", Computer, Vol. 35 No. 4, pp. 27-30.
    • (2002) Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 8
    • 9444272874 scopus 로고    scopus 로고
    • Study on reduct and core computation in incompatible information systems
    • Li, T.R., Qing, K.Y., Yang, N. and Xu, Y. (2004a), "Study on reduct and core computation in incompatible information systems", Lecture Notes in Artificial Intelligence, Vol. 3066, pp. 471-6.
    • (2004) Lecture Notes in Artificial Intelligence , vol.3066 , pp. 471-6
    • Li, T.R.1    Qing, K.Y.2    Yang, N.3    Xu, Y.4
  • 11
    • 8844222221 scopus 로고    scopus 로고
    • Linguistic assessment approach for managing nuclear safeguards indicator information
    • Ruan, D., Liu, J. and Carchon, R. (2003), "Linguistic assessment approach for managing nuclear safeguards indicator information", Logistics Information Management, Vol. 16 No. 6, pp. 401-19.
    • (2003) Logistics Information Management , vol.16 , Issue.6 , pp. 401-19
    • Ruan, D.1    Liu, J.2    Carchon, R.3
  • 12
    • 0007473204 scopus 로고    scopus 로고
    • An introduction to intrusion detection
    • Sundaram, A. (1996), "An introduction to intrusion detection", Crossroads: The ACM Student Magazine, Vol. 2 No. 4, pp. 3-7.
    • (1996) Crossroads: The ACM Student Magazine , vol.2 , Issue.4 , pp. 3-7
    • Sundaram, A.1
  • 13
    • 8844262079 scopus 로고    scopus 로고
    • CSIRO DIT Data Mining Technical Report, TR-DM-96013, available at: www.act.cmis.csiro.au/edm/papers/kddmodel.pdf
    • Williams, G. and Huang, Z.H. (1996), "Modelling the KDD process", CSIRO DIT Data Mining Technical Report, TR-DM-96013, available at: www.act.cmis.csiro.au/edm/papers/kddmodel.pdf.
    • (1996) Modelling the KDD Process
    • Williams, G.1    Huang, Z.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.