Volume 4, Number 1, June 2002
Constraints in data mining
, Ulrich Güntzer
: Is pushing constraints deeply into the mining algorithms really what we want?: an alternative approach for association rule mining.
Volume 4, Number 2, December 2002
Privacy and Security
: Cryptographic Techniques for Privacy-Preserving Data Mining.
: Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility.
Victor S. Y. Lo
: The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing.
Reports from KDD-2002
S. Sathiya Keerthi
, Chong Jin Ong
, Keng Boon Siah
, David B. L. Lim
, Wei Chu
, Min Shi
, David S. Edwin
, Rakesh Menon
, Lixiang Shen
, Jonathan Y. K. Lim
, Han Tong Loh
: A Machine Learning Approach for the Curation of Biomedical Literature - KDD Cup 2002 (Task 1).
: The Genomics of a Signaling Pathway: A KDD Cup Challenge Task.
: Feature Engineering for a Gene Regulation Prediction Task.
: Report on the SIGKDD-2002 Panel The Perfect Data Mining Tool: Interactive or Automated.