Sciweavers

511 search results - page 48 / 103
» Mining Inheritance Rules from Genealogical Data
Sort
View
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
15 years 5 months ago
Privacy Preserving Clustering on Horizontally Partitioned Data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...
Ali Inan, Yücel Saygin, Erkay Savas, Ay&ccedi...
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 9 months ago
Analyzing Abnormal Events from Spatio-temporal Trajectories
Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is capture...
Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong-Li L...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
16 years 6 days ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
WABI
2009
Springer
127views Bioinformatics» more  WABI 2009»
15 years 6 months ago
Constructing Majority-Rule Supertrees
Background: Supertree methods combine the phylogenetic information from multiple partially-overlapping trees into a larger phylogenetic tree called a supertree. Several supertree ...
Jianrong Dong, David Fernández-Baca, Fred R...
PADL
2000
Springer
15 years 3 months ago
Calculating a New Data Mining Algorithm for Market Basket Analysis
The general goal of data mining is to extract interesting correlated information from large collection of data. A key computationally-intensive subproblem of data mining involves ...
Zhenjiang Hu, Wei-Ngan Chin, Masato Takeichi