Sciweavers

62 search results - page 2 / 13
» Achieving k-Anonymity by Clustering in Attribute Hierarchica...
Sort
View
EUROCRYPT
2010
Springer
13 years 9 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
ICDM
2010
IEEE
230views Data Mining» more  ICDM 2010»
13 years 2 months ago
Clustering Large Attributed Graphs: An Efficient Incremental Approach
In recent years, many networks have become available for analysis, including social networks, sensor networks, biological networks, etc. Graph clustering has shown its effectivenes...
Yang Zhou, Hong Cheng, Jeffrey Xu Yu
PKDD
2010
Springer
177views Data Mining» more  PKDD 2010»
13 years 3 months ago
ITCH: Information-Theoretic Cluster Hierarchies
Hierarchical clustering methods are widely used in various scientific domains such as molecular biology, medicine, economy, etc. Despite the maturity of the research field of hie...
Christian Böhm, Frank Fiedler, Annahita Oswal...
MDAI
2007
Springer
13 years 11 months ago
Lindig's Algorithm for Concept Lattices over Graded Attributes
Formal concept analysis (FCA) is a method of exploratory data analysis. The data is in the form of a table describing relationship between objects (rows) and attributes (columns), ...
Radim Belohlávek, Bernard De Baets, Jan Out...
EMNLP
2009
13 years 2 months ago
Hypernym Discovery Based on Distributional Similarity and Hierarchical Structures
This paper presents a new method of developing a large-scale hyponymy relation database by combining Wikipedia and other Web documents. We attach new words to the hyponymy databas...
Ichiro Yamada, Kentaro Torisawa, Jun'ichi Kazama, ...