skip to main content
article
Free Access

Mining business databases

Published:01 November 1996Publication History
First page image

References

  1. 1 Anand, T. Opportunity Explorer: Navigating large databases using knowledge discovery templates. J. Intell. Inf. Syst. 4, 1 (Jan. 1995), 27-38.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2 Anand, T., and Kahn, G. Focusing knowledge-based techniques on market analysis. IEEE Expert 8, 4 (Aug. 1993), 19-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Brachman, R., and Anand, T. The process of knowledge discovery in databases: A human-centered approach. In Advances in Knowledge Discovery and Data Mining, U.M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, Eds. AAAI Press/The MIT Press, Cambridge, Mass., 1996, pp. 37-57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Brachman, R., Selfridge, P., Terveen, L., Altman, B., Borgida, A., Halper, F., Kirk, T., Lazar, A., McGuinness, D., and Resnick, L. Integrated support for data archaeology. Int. J. Intell. Coop. Inf. Syst. 2, 2 (June 1993), 159-185.Google ScholarGoogle Scholar
  5. 5 Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., and Uthurusamy, R., Eds. Advances in Knowledge Discovery and Data Mining. AAAI Press/The MIT Press, Cambridge, Mass., 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Hall, J., Mani, G., and Barr, D. Applying computational intelligence to the investment process. In Proceedings of CIFER-96: Computational Intelligence in Financial Engineering. (New York, March 1996). IEEE Press, Piscataway, N J., 1996.Google ScholarGoogle Scholar
  7. 7 Khabaza, T., and Shearer, C. Data mining with Clementine. In the digest of the IEE Colloquium on Knowledge Discovery in Databases, Digest 1995/021(B) (London, Feb. 1995).Google ScholarGoogle Scholar
  8. 8 Kloesgen, W. Tasks, methods, and applications of knowledge extraction. In New Techniques and Technologies for Statistics, W. Kloesgen, P. Nanopoulos, and A. Unwin, Eds. IOS Press, Amsterdam, 1996, 163-182.Google ScholarGoogle Scholar
  9. 9 Mannila, H., Toivonen, H., and Verkamo, A.I. Discovering frequent episodes in sequences. In Proceedings of 1st International Conference on Knowledge Discovery and Data Mining (Montrdal, Aug. 1995). AAAI Press, Menlo Park, Calif., 1995, pp. 210-215.Google ScholarGoogle Scholar
  10. 10 Matheus, C., Piatetsky-Shapiro, G., and McNeill, D. Selecting and reporting what is interesting: The KEFIR application to healthcare data. In Advances in Knowledge Discovery and Data Mining, U.M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, Eds. AAAI Press/The MIT Press, Cambridge, Mass., 1996, pp. 495-516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Selfridge, P.G., Srivastava, D., and Wilson, L.O. IDEA: Interactive Data Exploration and Analysis. In Proceedings of SIGMOD- 96 (Montrdal, June 1996). ACM Press, New York, 1996, pp. 24-34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 Senator, T.E., Goldberg, H.G., Wooten,J., Cottini, M.A., Khan, A.F.U., Klinger, C.D., Llamas, W.M., Marrone, M.P., and Wong, R.W.H. The Financial Crimes Enforcement Network M System (FMS): Identifying potential money laundering from reports of large cash transactions. AIMag. 16, 4 (Winter 1995), 21-39.Google ScholarGoogle Scholar

Index Terms

  1. Mining business databases

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 39, Issue 11
          Nov. 1996
          82 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/240455
          Issue’s Table of Contents

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader