Sciweavers

3651 search results - page 65 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2003
IEEE
220views Data Mining» more  ICDM 2003»
15 years 5 months ago
Exploiting Unlabeled Data for Improving Accuracy of Predictive Data Mining
Predictive data mining typically relies on labeled data without exploiting a much larger amount of available unlabeled data. The goal of this paper is to show that using unlabeled...
Kang Peng, Slobodan Vucetic, Bo Han, Hongbo Xie, Z...
116
Voted
WWW
2006
ACM
16 years 1 months ago
Template guided association rule mining from XML documents
Compared with traditional association rule mining in the structured world (e.g. Relational Databases), mining from XML data is confronted with more challenges due to the inherent ...
Rahman Ali Mohammadzadeh, Sadegh Soltan, Masoud Ra...
DMKD
2004
ACM
136views Data Mining» more  DMKD 2004»
15 years 6 months ago
Mining association rules with non-uniform privacy concerns
Privacy concerns have become an important issue in data mining. A popular way to preserve privacy is to randomize the dataset to be mined in a systematic way and mine the randomiz...
Yi Xia, Yirong Yang, Yun Chi
KDD
2003
ACM
120views Data Mining» more  KDD 2003»
16 years 29 days ago
On detecting differences between groups
Understanding the differences between contrasting groups is a fundamental task in data analysis. This realization has led to the development of a new special purpose data mining t...
Geoffrey I. Webb, Shane M. Butler, Douglas A. Newl...
ISI
2008
Springer
15 years 16 days ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh