Sciweavers

503 search results - page 62 / 101
» Output privacy in data mining
Sort
View
ICDE
2001
IEEE
141views Database» more  ICDE 2001»
15 years 11 months ago
TAR: Temporal Association Rules on Evolving Numerical Attributes
Data mining has been an area of increasing interests during recent years. The association rule discovery problem in particular has been widely studied. However, there are still so...
Wei Wang 0010, Jiong Yang, Richard R. Muntz
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 4 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
15 years 4 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
15 years 3 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
IJMI
2007
140views more  IJMI 2007»
14 years 10 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson