Sciweavers

204 search results - page 40 / 41
» Hiding Sensitive Patterns in Association Rules Mining
Sort
View
ICCS
2003
Springer
13 years 10 months ago
Design and Evaluation of Distributed Smart Disk Architecture for I/O-Intensive Workloads
Smart disks, a type of processor-embedded active I/O devices, with their on-disk memory and network interface controller, can be viewed as processing elements with attached storage...
Steve C. Chiu, Wei-keng Liao, Alok N. Choudhary
FUIN
2000
109views more  FUIN 2000»
13 years 5 months ago
Building Knowledge Scouts Using KGL Metalanguage
Knowledge scouts are software agents that autonomously search for and synthesize user-oriented knowledge (target knowledge) in large local or distributed databases. A knowledge ge...
Ryszard S. Michalski, Kenneth A. Kaufman
KDD
2003
ACM
142views Data Mining» more  KDD 2003»
14 years 5 months ago
Frequent-subsequence-based prediction of outer membrane proteins
A number of medically important disease-causing bacteria (collectively called Gram-negative bacteria) are noted for the extra "outer" membrane that surrounds their cell....
Rong She, Fei Chen 0002, Ke Wang, Martin Ester, Je...
ICDE
2004
IEEE
133views Database» more  ICDE 2004»
14 years 6 months ago
GenExplore: Interactive Exploration of Gene Interactions from Microarray Data
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
CEAS
2008
Springer
13 years 7 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...