Sciweavers

3651 search results - page 67 / 731
» Data Mining for Security Applications
Sort
View
120
Voted
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
16 years 29 days ago
Using retrieval measures to assess similarity in mining dynamic web clickstreams
While scalable data mining methods are expected to cope with massive Web data, coping with evolving trends in noisy data in a continuous fashion, and without any unnecessary stopp...
Olfa Nasraoui, Cesar Cardona, Carlos Rojas
100
Voted
INDOCRYPT
2004
Springer
15 years 6 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora
117
Voted
AISADM
2007
Springer
15 years 6 months ago
Peer-to-Peer Data Mining, Privacy Issues, and Games
Peer-to-Peer (P2P) networks are gaining increasing popularity in many distributed applications such as file-sharing, network storage, web caching, searching and indexing of releva...
Kanishka Bhaduri, Kamalika Das, Hillol Kargupta
ACSW
2004
15 years 2 months ago
Cost-Efficient Mining Techniques for Data Streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
78
Voted
KDD
2005
ACM
89views Data Mining» more  KDD 2005»
16 years 29 days ago
Mining risk patterns in medical data
In this paper, we discuss a problem of finding risk patterns in medical data. We define risk patterns by a statistical metric, relative risk, which has been widely used in epidemi...
Jiuyong Li, Ada Wai-Chee Fu, Hongxing He, Jie Chen...