Sciweavers

503 search results - page 64 / 101
» Output privacy in data mining
Sort
View
PAAMS
2010
Springer
14 years 7 months ago
An Automatic Programming ACO-Based Algorithm for Classification Rule Mining
In this paper we present a novel algorithm, named GBAP, that jointly uses automatic programming with ant colony optimization for mining classification rules. GBAP is based on a con...
Juan Luis Olmo, Jose María Luna, José...
ICDE
2010
IEEE
290views Database» more  ICDE 2010»
15 years 2 months ago
The Model-Summary Problem and a Solution for Trees
Modern science is collecting massive amounts of data from sensors, instruments, and through computer simulation. It is widely believed that analysis of this data will hold the key ...
Biswanath Panda, Mirek Riedewald, Daniel Fink
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
14 years 11 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
CCS
2006
ACM
15 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
SIGKDD
2000
150views more  SIGKDD 2000»
14 years 9 months ago
KDD-Cup 2000 Organizers' Report: Peeling the Onion
We describe KDD-Cup 2000, the yearly competition in data mining. For the first time the Cup included insight problems in addition to prediction problems, thus posing new challenge...
Ron Kohavi, Carla E. Brodley, Brian Frasca, Llew M...