Concept Data Analysis - Theory and Applications
The three main areas explored are interactive mining of documents or collections of documents (including Web documents), automatic text ranking, and rule mining from structured data. The potentials of conceptual data analysis in the application areas being considered are further illustrated by two detailed case studies.
Concept Data Analysis: Theory & Applications is essential for researchers active in information processing and management and industry practitioners who are interested in creating a commercial product for conceptual data analysis or developing content management applications.
Table of Contents
I: THEORY AND ALGORITHMS.
1. Theoretical Foundations.
1.1 Basic Notions of Orders and Lattices.
1.2 Context, Concept, and Concept Lattice.
1.3 Many-valued Contexts.
1.4 Bibliographic Notes.
2.1 Constructing Concept Lattices.
2.2 Incremental Lattice Update.
2.4 Adding Knowledge to Concept Lattices.
2.5 Bibliographic Notes.
3. Information Retrieval.
3.1 Query Modification.
3.2 Document Ranking
4. Text Mining.
4.1 Mining the Content of the ACM Digital Library.
4.2 MiningWeb Retrieval Results with CREDO.
4.3 Bibliographic Notes.
5. Rule Mining.
5.2 Functional Dependencies.
5.3 Association Rules.
5.4 Classification Rules.
5.5 Bibliographic Notes.
Sign up now »
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- U.S. urged to let companies 'hack-back' at IP cyber thieves
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- Researchers find more versions of digitally signed Mac OS X spyware
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes