Sciweavers

3651 search results - page 20 / 731
» Data Mining for Security Applications
Sort
View
PAKDD
2007
ACM
183views Data Mining» more  PAKDD 2007»
15 years 4 months ago
Translation and Rotation Invariant Mining of Frequent Trajectories: Application to Protein Unfolding Pathways
We present a framework for mining frequent trajectories, which are translated and/or rotated with respect to one another. We then discuss a multiresolution methodology, based on th...
Alexander Andreopoulos, Bill Andreopoulos, Aijun A...
118
Voted
MOBIDE
2010
ACM
14 years 10 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
15 years 10 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li
CAINE
2008
14 years 11 months ago
Hierarchical Clustering of Features on Categorical Data of Biomedical Applications
Data mining became increasingly important in bioinformatics and biomedical area during last decade. Various data mining methods, such as association rule mining and clustering, ha...
Yi Lu, Lily R. Liang
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
15 years 10 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov