Sciweavers

114 search results - page 22 / 23
» When do data mining results violate privacy
Sort
View
ICDE
2008
IEEE
219views Database» more  ICDE 2008»
14 years 7 months ago
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
Preserving individual privacy when publishing data is a problem that is receiving increasing attention. According to the k-anonymity principle, each release of data must be such th...
Osman Abul, Francesco Bonchi, Mirco Nanni
ICDM
2007
IEEE
227views Data Mining» more  ICDM 2007»
14 years 2 days ago
Optimal Subsequence Bijection
We consider the problem of elastic matching of sequences of real numbers. Since both a query and a target sequence may be noisy, i.e., contain some outlier elements, it is desirab...
Longin Jan Latecki, Qiang Wang, Suzan Koknar-Tezel...
SDM
2012
SIAM
281views Data Mining» more  SDM 2012»
11 years 8 months ago
Contextual Collaborative Filtering via Hierarchical Matrix Factorization
Matrix factorization (MF) has been demonstrated to be one of the most competitive techniques for collaborative filtering. However, state-of-the-art MFs do not consider contextual...
ErHeng Zhong, Wei Fan, Qiang Yang
PRL
2010
159views more  PRL 2010»
13 years 4 months ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith
BMCBI
2011
13 years 23 days ago
Learning genetic epistasis using Bayesian network scoring criteria
Background: Gene-gene epistatic interactions likely play an important role in the genetic basis of many common diseases. Recently, machine-learning and data mining methods have be...
Xia Jiang, Richard E. Neapolitan, M. Michael Barma...