### Table 2: Modeling Objectives and Data Mining Techniques

1999

"... In PAGE 4: ... Unsupervised learning methods while more frequently used in cases where a target field does not exist, can be deployed on data for which a target field exists. Table2 breaks down data mining techniques by... ..."

Cited by 1

### TABLE IX SELECTION OF SUITABLE DATA MINING TECHNIQUE

### Table 1 List of data mining applications in IDS

in of

"... In PAGE 2: ... Data gathered by sensors are evaluated by a detector using a detection technique. Table1 shows the studies of data mining applications for IDS. D.... ..."

### Table 4.1: Summarization of appropriate data mining techniques of each data mining method

2002

### Table 4: Some results of applying data mining techniques on maintenance data of air handling units Data Mining

### Table 5: Some results of applying data mining techniques on maintenance data of thermostatic mixing valves Data Mining

### Table IV: Summary of data mining techniques for network intrusion detection.

2004

Cited by 5

### Table 1: A generic time series data mining approach

2007

"... In PAGE 4: ... Each can be visualized as an attempt to approximate the signal with a linear combination of basis functions While there are literally hundreds of papers on discretizing (symbolizing, tokenizing, quantizing) time series [3, 27] (see [15] for an extensive survey), none of the techniques allows a distance measure that lower bounds a distance measure defined on the original time series. For this reason, the generic time series data mining approach illustrated in Table1 is of little utility, since the approximate solution to problem created in main memory may be arbitrarily dissimilar to the true solution that would have been obtained on the original data. If, however, one had a symbolic approach that allowed lower bounding of the true distance, one could take advantage of the generic time series data mining model, and of a host of other algorithms, definitions and data structures which are only defined for discrete data, including hashing, Markov models, and suffix trees.... ..."

Cited by 1