Sciweavers

1053 search results - page 105 / 211
» Improving the SLA Algorithm Using Association Rules
Sort
View
80
Voted
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
15 years 7 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
126
Voted
ICDM
2005
IEEE
139views Data Mining» more  ICDM 2005»
15 years 6 months ago
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation
In order to generate synthetic basket data sets for better benchmark testing, it is important to integrate characteristics from real-life databases into the synthetic basket data ...
Yongge Wang, Xintao Wu
IJAIT
2007
180views more  IJAIT 2007»
15 years 18 days ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
109
Voted
SAC
2002
ACM
15 years 10 days ago
Soft constraint propagation and solving in CHRs
Soft constraints are a generalization of classical constraints, where constraints and/or partial assignments are associated to preference or importance levels, and constraints are...
Stefano Bistarelli, Thom W. Frühwirth, Michae...
BMCBI
2010
121views more  BMCBI 2010»
15 years 24 days ago
A Markov blanket-based method for detecting causal SNPs in GWAS
Background: Detecting epistatic interactions associated with complex and common diseases can help to improve prevention, diagnosis and treatment of these diseases. With the develo...
Bing Han, Meeyoung Park, Xue-wen Chen