Sciweavers

245 search results - page 47 / 49
» Efficient Algorithms for Discovering Association Rules
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 5 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 5 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
LREC
2008
131views Education» more  LREC 2008»
13 years 6 months ago
Chinese Term Extraction Based on Delimiters
Existing techniques extract term candidates by looking for internal and contextual information associated with domain specific terms. The algorithms always face the dilemma that f...
Yuhang Yang, Qin Lu, Tiejun Zhao
NAR
2007
111views more  NAR 2007»
13 years 4 months ago
PEDANT genome database: 10 years online
The PEDANT genome database provides exhaustive annotation of 468 genomes by a broad set of bioinformatics algorithms. We describe recent developments of the PEDANT Web server. The...
M. Louise Riley, Thorsten Schmidt, Irena I. Artamo...
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 5 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal