Sciweavers

503 search results - page 78 / 101
» Output privacy in data mining
Sort
View
DAWAK
2003
Springer
15 years 3 months ago
Designing Web Warehouses from XML Schemas
Web warehousing plays a key role in providing the managers with up-to-date and comprehensive information about their business domain. On the other hand, since XML is now a standard...
Boris Vrdoljak, Marko Banek, Stefano Rizzi
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
15 years 4 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
PAISI
2009
Springer
15 years 4 months ago
Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences
Discovering a representative set of theme patterns from a large amount of text for interpreting their meaning has always been concerned by researches of both data mining and inform...
Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang, ...
ICDM
2009
IEEE
110views Data Mining» more  ICDM 2009»
15 years 4 months ago
Projective Clustering Ensembles
Recent advances in data clustering concern clustering ensembles and projective clustering methods, each addressing different issues in clustering problems. In this paper, we consi...
Francesco Gullo, Carlotta Domeniconi, Andrea Tagar...
ACSAC
2006
IEEE
15 years 4 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra