Sciweavers

3651 search results - page 145 / 731
» Data Mining for Security Applications
Sort
View
KDD
2010
ACM
246views Data Mining» more  KDD 2010»
15 years 3 months ago
Latent aspect rating analysis on review text data: a rating regression approach
In this paper, we define and study a new opinionated text data analysis problem called Latent Aspect Rating Analysis (LARA), which aims at analyzing opinions expressed about an e...
Hongning Wang, Yue Lu, Chengxiang Zhai
PAKDD
2004
ACM
121views Data Mining» more  PAKDD 2004»
15 years 10 months ago
Secure Association Rule Sharing
Abstract. The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal stra...
Stanley R. M. Oliveira, Osmar R. Zaïane, Y&uu...
PVLDB
2008
82views more  PVLDB 2008»
15 years 4 months ago
Mining non-redundant high order correlations in binary data
Many approaches have been proposed to find correlations in binary data. Usually, these methods focus on pair-wise correlations. In biology applications, it is important to find co...
Xiang Zhang, Feng Pan, Wei Wang 0010, Andrew B. No...
VTC
2008
IEEE
15 years 11 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
ENGL
2007
180views more  ENGL 2007»
15 years 5 months ago
Biological Data Mining for Genomic Clustering Using Unsupervised Neural Learning
— The paper aims at designing a scheme for automatic identification of a species from its genome sequence. A set of 64 three-tuple keywords is first generated using the four type...
Shreyas Sen, Seetharam Narasimhan, Amit Konar