-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Washington DC, USA, ACM Press
-
Agrawal, R., Imielinski, T. and Swami, A. (1993): Mining association rules between sets of items in large databases. Proc. ACM SIGMOD International Conference on Management of Data, Washington DC, USA, 22:207-216, ACM Press.
-
(1993)
Proc. ACM SIGMOD International Conference on Management of Data
, vol.22
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
2
-
-
0001882616
-
Fast algorithms for Mining Association Rules
-
Satiago, Chile
-
Agrawal, R, and Srikant, R. (1994) Fast algorithms for Mining Association Rules. Proceedings of the International Conference on Very Large Data Bases, Satiago, Chile, 487 - 499.
-
(1994)
Proceedings of the International Conference on Very Large Data Bases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
34547732966
-
Applying negative rule mining to improve genome annotation
-
(Jul 21)
-
Artamonova, I., Frishman. G., Frishman D. (2007) Applying negative rule mining to improve genome annotation. BMC Bioinformatics. (Jul 21);8 (1):261.
-
(2007)
BMC Bioinformatics
, vol.8
, Issue.1
, pp. 261
-
-
Artamonova, I.1
Frishman, G.2
Frishman, D.3
-
5
-
-
84870550967
-
-
15th Conference on Computational Statistics (Compstat 2002, Berlin, Germany) Physica Verlag, Heidelberg, Germany
-
Borgelt, C. and Kruse, R. (2002). Induction of Association Rules: Apriori Implementation. 15th Conference on Computational Statistics (Compstat 2002, Berlin, Germany) Physica Verlag, Heidelberg, Germany. http://www.borgelt.net/apriori.html
-
(2002)
Induction of Association Rules: Apriori Implementation
-
-
Borgelt, C.1
Kruse, R.2
-
6
-
-
70449100804
-
-
In Second Asia-Pacific Conference on Simulated Evolution and Learning (SEAL '98), Canberra, Australia. LNAI 1585 Springer
-
He H., Graco, W. and Yao X. (1998) Application of Genetic Algorithm and k-Nearest Neighbour Method in Medical Fraud Detection. In Second Asia-Pacific Conference on Simulated Evolution and Learning (SEAL '98), Canberra, Australia. pp. 74-81, LNAI 1585 Springer
-
(1998)
Application of Genetic Algorithm and k-Nearest Neighbour Method in Medical Fraud Detection
, pp. 74-81
-
-
He, H.1
Graco, W.2
Yao, X.3
-
7
-
-
37349096433
-
Intelligent physician segmentation and management based on KDD approach. (2008)
-
Pergamon Press, Inc. Tarrytown, NY, USA
-
Lin, C., Lin, C-M., Li, S-T. and Kuo, S-C. (2008) Intelligent physician segmentation and management based on KDD approach. (2008) Expert Systems with Applications. 34(3): 1963-1973. Pergamon Press, Inc. Tarrytown, NY, USA
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.3
, pp. 1963-1973
-
-
Lin, C.1
Lin, C.-M.2
Li, S.-T.3
Kuo, S.-C.4
-
8
-
-
84870498280
-
-
Medicare Benefit Schedule Book Australian Government
-
Medicare Benefit Schedule Book (2007) Australian Government, ISBN 1-74186-363-5, Department of Health and Ageing, Australian Government. Canberra. ISBN 1-74186-363-5
-
(2007)
-
-
-
11
-
-
4344657843
-
Discovering patterns of medical practice in large administrative health databases
-
Elsevier Science Publishers B. V. ISSN ISSN0169-023X Amsterdam, The Netherlands
-
Semenova T. (2004) Discovering patterns of medical practice in large administrative health databases. Data Knowledge Engineering. 51(2): 149-160, Elsevier Science Publishers B. V. ISSN 0169-023X Amsterdam, The Netherlands
-
(2004)
Data Knowledge Engineering
, vol.51
, Issue.2
, pp. 149-160
-
-
Semenova, T.1
-
12
-
-
33644780888
-
A process-mining framework for the detection of healthcare fraud and abuse
-
Elsevier
-
Yang, W-S. and Hwang, S-Y. (2006) A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications. 31: 56-68. Elsevier
-
(2006)
Expert Systems with Applications
, vol.31
, pp. 56-68
-
-
Yang, W.-S.1
Hwang, S.-Y.2
-
13
-
-
0042823817
-
Association Rule Mining: Models and Algorithms
-
ISBN: 978-3-540-43533-4
-
Zhang, C., Zhang, S. (2002) Association Rule Mining: Models and Algorithms. Lecture Notes in Computer Science, 2307. ISBN: 978-3-540-43533-4
-
(2002)
Lecture Notes in Computer Science
, pp. 2307
-
-
Zhang, C.1
Zhang, S.2
|