Sciweavers

7387 search results - page 440 / 1478
» Knowledge-based data mining
Sort
View
WPES
2003
ACM
15 years 9 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 9 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
ICDM
2002
IEEE
106views Data Mining» more  ICDM 2002»
15 years 9 months ago
Neighborgram Clustering Interactive Exploration of Cluster Neighborhoods
Proceedings of IEEE Data Mining, IEEE Press, pp. 581-584, 2002. We describe an interactive way to generate a set of clusters for a given data set. The clustering is done by constr...
Michael R. Berthold, Bernd Wiswedel, David E. Patt...
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 5 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
KDD
2006
ACM
208views Data Mining» more  KDD 2006»
16 years 4 months ago
Frequent subgraph mining in outerplanar graphs
In recent years there has been an increased interest in frequent pattern discovery in large databases of graph structured objects. While the frequent connected subgraph mining pro...
Tamás Horváth, Jan Ramon, Stefan Wro...