Sciweavers

2932 search results - page 89 / 587
» Higher order mining
Sort
View
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 6 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
CORR
2010
Springer
96views Education» more  CORR 2010»
14 years 12 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
144
Voted
DASFAA
2004
IEEE
164views Database» more  DASFAA 2004»
15 years 8 months ago
On Addressing Efficiency Concerns in Privacy-Preserving Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to...
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
16 years 5 months ago
Clustering pair-wise dissimilarity data into partially ordered sets
Ontologies represent data relationships as hierarchies of possibly overlapping classes. Ontologies are closely related to clustering hierarchies, and in this article we explore th...
Jinze Liu, Qi Zhang, Wei Wang 0010, Leonard McMill...
ICDM
2006
IEEE
109views Data Mining» more  ICDM 2006»
15 years 11 months ago
Star-Structured High-Order Heterogeneous Data Co-clustering Based on Consistent Information Theory
Heterogeneous object co-clustering has become an important research topic in data mining. In early years of this research, people mainly worked on two types of heterogeneous data ...
Bin Gao, Tie-Yan Liu, Wei-Ying Ma