TY - CHAP
T1 - Sensitivity Analysis of Proactive Data Mining
AU - Dahan, Haim
AU - Cohen, Shahar
AU - Rokach, Lior
AU - Maimon, Oded
PY - 2014
Y1 - 2014
N2 - As stated in Chap. 4, to achieve an effective and applicable solution for a data mining problem, it is vital to thoroughly understand the problem at hand, in particular its constraints, environment and its problem specific knowledge. However, it is difficult to pinpoint the exact knowledge (i.e., attribute values) necessary for optimally implementing the proactive data mining method. In this chapter we present several scenarios over the security company’s case (Chap. 4) to demonstrate the general boundaries of the method.
AB - As stated in Chap. 4, to achieve an effective and applicable solution for a data mining problem, it is vital to thoroughly understand the problem at hand, in particular its constraints, environment and its problem specific knowledge. However, it is difficult to pinpoint the exact knowledge (i.e., attribute values) necessary for optimally implementing the proactive data mining method. In this chapter we present several scenarios over the security company’s case (Chap. 4) to demonstrate the general boundaries of the method.
KW - Proactive data mining
KW - Sensitivity analysis
U2 - 10.1007/978-1-4939-0539-3_5
DO - 10.1007/978-1-4939-0539-3_5
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.chapter???
SN - 978-1-4939-0538-6
T3 - SpringerBriefs in Electrical and Computer Engineering
SP - 63
EP - 85
BT - PROACTIVE DATA MINING WITH DECISION TREES
ER -