Sciweavers

7053 search results - page 198 / 1411
» Data Mining
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 10 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
IADIS
2008
15 years 5 months ago
Towards A Model-Driven Engineering Approach of Data Mining
Nowadays, data mining is based on low-level speci cations of the employed techniques typically bounded to a speci c analysis platform. Therefore, data mining lacks a modelling arc...
Jesús Pardillo, José Jacobo Zubcoff,...
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
15 years 2 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
15 years 8 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...