Now showing items 1-6 of 6

    • Blaze Department Stores 

      Banerjee, Arindam (2010-08-18)
      This case provides a setting to develop a data analysis plan. Research objectives and research design in this case do not blend well and hence these are additional complications. This case provides adequate opportunity to ...
    • Efficient mining of high utility itemsets with multiple minimum utility thresholds 

      Krishnamoorthy, Srikumar (Elsevier, 2018-01)
      Mining high utility itemsets is considered to be one of the important and challenging problems in the data mining literature. The problem offers greater flexibility to a decision maker in using item utilities such as ...
    • HMiner: efficiently mining high utility itemsets 

      Krishnamoorthy, Srikumar (Elsevier, 2017-12-30)
      High utility itemset mining problem uses the notion of utilities to discover interesting and actionable patterns. Several data structures and heuristic methods have been proposed in the literature to efficiently mine ...
    • Mid West Retail Consumer Finance Services (B): Sarah Jablonski's Dilemma 

      Banerjee, Arindam (2010-08-18)
      The case focuses on the use of secondary source data to perform segmentation analysis. There is ample opportunity to structure the business problem based on the symptoms described. The case is based on a moderately sized ...
    • Pruning strategies for mining high utility itemsets 

      Krishnamoorthy, Srikumar (Elsevier, 2015)
      High utility itemset mining problem involves the use of internal and external utilities of items (such as profits, margins) to discover interesting patterns from a given transactional database. It is an extension of the ...
    • A two-stage integer programming model considering transaction equivalence for privacy preservation 

      Krishnamoorthy, Srikumar (Elsevier, 2022-08-17)
      Preserving privacy is one of the fundamental requirements of firms that share data with their business partners for building advanced data mining models. Firms often aim to protect the disclosure of sensitive knowledge or ...