|
|
Untersuchte Arbeit: Seite: 414, Zeilen: 20-25 |
Quelle: Han_Kamber_2006 Seite(n): 560, 561, Zeilen: 560: last lines; 561: 1ff |
---|---|
How can we mine terrorist networks? Traditional methods of machine learning and data mining, taking a random sample of homogeneous objects from a single relation as input, may not be appropriate. The data comprising terrorist networks tend to be heterogeneous, multi-relational, and semi-structured. IDM embodies descriptive and predictive modeling. By considering links (relationships between the entities), more information is made available to the mining process. | “How can we mine social networks?” Traditional methods of machine learning and data mining, taking, as input, a random sample of homogenous [sic] objects from a single
[page 561] relation, may not be appropriate here. The data comprising social networks tend to be heterogeneous, multirelational, and semi-structured.[...] It embodies descriptive and predictive modeling. By considering links (the relationships between objects), more information is made available to the mining process. |
The source is not mentioned anywhere in the paper. Also the formatting with italics is parallel. |
|