Sciweavers

3651 search results - page 31 / 731
» Data Mining for Security Applications
Sort
View
73
Voted
ISDA
2005
IEEE
15 years 3 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
JPDC
2008
134views more  JPDC 2008»
14 years 10 months ago
Middleware for data mining applications on clusters and grids
This paper gives an overview of two middleware systems that have been developed over the last 6 years to address the challenges involved in developing parallel and distributed imp...
Leonid Glimcher, Ruoming Jin, Gagan Agrawal
93
Voted
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
15 years 10 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
87
Voted
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
15 years 10 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng
72
Voted
PAKDD
2009
ACM
87views Data Mining» more  PAKDD 2009»
15 years 5 months ago
Application-Independent Feature Construction from Noisy Samples
When training classifiers, presence of noise can severely harm their performance. In this paper, we focus on “non-class” attribute noise and we consider how a frequent fault-t...
Dominique Gay, Nazha Selmaoui, Jean-Françoi...