Sciweavers

3651 search results - page 25 / 731
» Data Mining for Security Applications
Sort
View
ICWS
2009
IEEE
16 years 1 months ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
CCS
2006
ACM
15 years 8 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
ISVC
2005
Springer
15 years 10 months ago
Mining Paths of Complex Crowd Scenes
The Ambient Intelligence (AmI) paradigm requires a robust interpretation of people actions and behaviour and a way for automatically generating persistent spatial-temporal models o...
Beibei Zhan, Paolo Remagnino, Sergio A. Velastin
IPPS
2000
IEEE
15 years 9 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 10 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...