Sciweavers

1398 search results - page 192 / 280
» Medical Database Security
Sort
View
87
Voted
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 1 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
120
Voted
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 23 days ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ADBIS
2009
Springer
144views Database» more  ADBIS 2009»
15 years 7 months ago
Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
Vytautas Cyras, Kristina Lapin
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
15 years 7 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
91
Voted
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 6 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...