Sciweavers

3651 search results - page 19 / 731
» Data Mining for Security Applications
Sort
View
CIKM
2006
Springer
15 years 1 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
SACMAT
2009
ACM
15 years 4 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
DMSN
2010
ACM
14 years 11 months ago
DEMS: a data mining based technique to handle missing data in mobile sensor network applications
In Mobile Sensor Network (MSN) applications, sensors move to increase the area of coverage and/or to compensate for the failure of other sensors. In such applications, loss or cor...
Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Han...
95
Voted
SIGMOD
1998
ACM
233views Database» more  SIGMOD 1998»
15 years 2 months ago
Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications
Data mining applications place special requirements on clustering algorithms including: the ability to nd clusters embedded in subspaces of high dimensional data, scalability, end...
Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopul...
77
Voted
SAC
2006
ACM
15 years 4 months ago
Discretization from data streams: applications to histograms and data mining
Abstract. In this paper we propose a new method to perform incremental discretization. The basic idea is to perform the task in two layers. The first layer receives the sequence o...
João Gama, Carlos Pinto