Sciweavers

137 search results - page 15 / 28
» Hiding informative association rule sets
Sort
View
JCS
2008
93views more  JCS 2008»
14 years 9 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
ACL
1998
14 years 11 months ago
Trigger-Pair Predictors in Parsing and Tagging
In this article, we apply to natural language parsing and tagging the device of triggerpair predictors, previously employed exclusively within the field of language modelling for ...
Ezra Black, Andrew M. Finch, Hideki Kashioka
PAAPP
2007
109views more  PAAPP 2007»
14 years 9 months ago
Relation rule mining
\Web users are nowadays confronted with the huge variety of available information sources whose content is not targeted at any specific group or layer. Recommendation systems aim...
Mehdi Adda, Rokia Missaoui, Petko Valtchev
IQ
2007
14 years 11 months ago
Rule-Based Measurement Of Data Quality In Nominal Data
: Sufficiently high data quality is crucial for almost every application. Nonetheless, data quality issues are nearly omnipresent. The reasons for poor quality cannot simply be bla...
Jochen Hipp, Markus Müller, Johannes Hohendor...
IJFCS
2008
102views more  IJFCS 2008»
14 years 9 months ago
Succinct Minimal Generators: Theoretical Foundations and Applications
In data mining applications, highly sized contexts are handled what usually results in a considerably large set of frequent itemsets, even for high values of the minimum support t...
Tarek Hamrouni, Sadok Ben Yahia, Engelbert Mephu N...