Sciweavers

7053 search results - page 101 / 1411
» Data Mining
Sort
View
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 3 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
112
Voted
PAKDD
2004
ACM
117views Data Mining» more  PAKDD 2004»
15 years 8 months ago
Constraint-Based Mining of Formal Concepts in Transactional Data
We are designing new data mining techniques on boolean contexts to identify a priori interesting concepts, i.e., closed sets of objects (or transactions) and associated closed sets...
Jérémy Besson, Céline Robarde...
122
Voted
SDM
2007
SIAM
195views Data Mining» more  SDM 2007»
15 years 4 months ago
On Anonymization of String Data
String data is especially important in the privacy preserving data mining domain because most DNA and biological data is coded as strings. In this paper, we will discuss a new met...
Charu C. Aggarwal, Philip S. Yu
ICDE
2000
IEEE
118views Database» more  ICDE 2000»
16 years 4 months ago
Mining Recurrent Items in Multimedia with Progressive Resolution Refinement
Despite the overwhelming amounts of multimedia data recently generated and the significance of such data, very few people have systematically investigated multimedia data mining. ...
Hua Zhu, Jiawei Han, Osmar R. Zaïane