Sciweavers

901 search results - page 88 / 181
» On Anonymization of String Data
Sort
View
KYOTODL
2000
140views more  KYOTODL 2000»
15 years 2 months ago
Text Data Mining: Discovery of Important Keywords in the Cyberspace
This paper describes applications of the optimized pattern discover),framework to text and Webmining. In particular; we introduce a class of simple combinatorialpatterns over phra...
Hiroki Arimura, Jun-ichiro Abe, Hiroshi Sakamoto, ...
SDM
2007
SIAM
118views Data Mining» more  SDM 2007»
15 years 2 months ago
On Privacy-Preservation of Text and Sparse Binary Data with Sketches
In recent years, privacy preserving data mining has become very important because of the proliferation of large amounts of data on the internet. Many data sets are inherently high...
Charu C. Aggarwal, Philip S. Yu
CCS
2008
ACM
15 years 3 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
BTW
2009
Springer
145views Database» more  BTW 2009»
15 years 8 months ago
Towards web Supported Identification of Top Affiliations from Scholarly Papers
: Frequent successful publications by specific institutions are indicators for identifying outstanding centres of research. This institution data are present in scholarly papers as...
David Aumüller
DEXAW
2007
IEEE
92views Database» more  DEXAW 2007»
15 years 7 months ago
Subtree Testing and Closed Tree Mining Through Natural Representations
Several classical schemes exist to represent trees as strings over a fixed alphabet; these are useful in many algorithmic and conceptual studies. Our previous work has proposed a...
José L. Balcázar, Albert Bifet, Anto...