Sciweavers

387 search results - page 57 / 78
» Data mining with differential privacy
Sort
View
ISCI
2007
99views more  ISCI 2007»
14 years 9 months ago
Privacy-preserving algorithms for distributed mining of frequent itemsets
Standard algorithms for association rule mining are based on identification of frequent itemsets. In this paper, we study how to maintain privacy in distributed mining of frequen...
Sheng Zhong
SIGMOD
2008
ACM
136views Database» more  SIGMOD 2008»
15 years 10 months ago
Mining relationships among interval-based events for classification
Existing temporal pattern mining assumes that events do not have any duration. However, events in many real world applications have durations, and the relationships among these ev...
Dhaval Patel, Wynne Hsu, Mong-Li Lee
CIKM
2006
Springer
15 years 1 months ago
Mining blog stories using community-based and temporal clustering
In recent years, weblogs, or blogs for short, have become an important form of online content. The personal nature of blogs, online interactions between bloggers, and the temporal...
Arun Qamra, Belle L. Tseng, Edward Y. Chang
CEC
2010
IEEE
14 years 7 months ago
A grammar based Ant Programming algorithm for mining classification rules
This paper focuses on the application of a new ACO-based automatic programming algorithm to the classification task of data mining. This new model, called GBAP algorithm, is based ...
Juan Luis Olmo, José Raúl Romero, Se...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
15 years 11 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal