Sciweavers

65 search results - page 12 / 13
» Mining association rules with non-uniform privacy concerns
Sort
View
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
14 years 2 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
13 years 11 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
CINQ
2004
Springer
116views Database» more  CINQ 2004»
13 years 9 months ago
A Survey on Condensed Representations for Frequent Sets
Abstract. Solving inductive queries which have to return complete collections of patterns satisfying a given predicate has been studied extensively the last few years. The specific...
Toon Calders, Christophe Rigotti, Jean-Franç...
ICWSM
2009
13 years 3 months ago
You Are Where You Edit: Locating Wikipedia Contributors through Edit Histories
Whether knowingly or otherwise, Wikipedia contributors reveal their interests and expertise through their contribution patterns. An analysis of Wikipedia edit histories shows that...
Michael D. Lieberman, Jimmy Lin
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 1 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...