Sciweavers

3651 search results - page 59 / 731
» Data Mining for Security Applications
Sort
View
119
Voted
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 7 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
KDD
2006
ACM
201views Data Mining» more  KDD 2006»
16 years 28 days ago
Polynomial association rules with applications to logistic regression
A new class of associations (polynomial itemsets and polynomial association rules) is presented which allows for discovering nonlinear relationships between numeric attributes wit...
Szymon Jaroszewicz
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 1 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
75
Voted
ETRICS
2006
15 years 4 months ago
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the...
Jim Dowd, Shouhuai Xu, Weining Zhang
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 1 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King