Sciweavers

503 search results - page 71 / 101
» Output privacy in data mining
Sort
View
ICDM
2008
IEEE
184views Data Mining» more  ICDM 2008»
15 years 6 months ago
Bayesian Co-clustering
In recent years, co-clustering has emerged as a powerful data mining tool that can analyze dyadic data connecting two entities. However, almost all existing co-clustering techniqu...
Hanhuai Shan, Arindam Banerjee
ICDM
2006
IEEE
164views Data Mining» more  ICDM 2006»
15 years 5 months ago
Unsupervised Learning of Tree Alignment Models for Information Extraction
We propose an algorithm for extracting fields from HTML search results. The output of the algorithm is a database table– a data structure that better lends itself to high-level...
Philip Zigoris, Damian Eads, Yi Zhang
DKE
2010
167views more  DKE 2010»
14 years 9 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 1 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
16 years 7 days ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung