Sciweavers

1846 search results - page 308 / 370
» Genetic-Fuzzy Data Mining Techniques
Sort
View
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 4 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 1 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
LAWEB
2006
IEEE
15 years 5 months ago
Analysis of Web Search Engine Clicked Documents
In this paper we process and analyze web search engine query and click data from the perspective of the documents (URL’s) selected. We initially define possible document categor...
David F. Nettleton, Liliana Calderón-Benavi...
MSR
2006
ACM
15 years 5 months ago
An open framework for CVS repository querying, analysis and visualization
We present an open framework for visual mining of CVS software repositories. We address three aspects: data extraction, analysis and visualization. We first discuss the challenges...
Lucian Voinea, Alexandru Telea
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 4 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...