Sciweavers

503 search results - page 84 / 101
» Output privacy in data mining
Sort
View
PAKDD
2005
ACM
102views Data Mining» more  PAKDD 2005»
15 years 3 months ago
Automatic Occupation Coding with Combination of Machine Learning and Hand-Crafted Rules
Abstract. We apply a machine learning method to the occupation coding, which is a task to categorize the answers to open-ended questions regarding the respondent’s occupation. Sp...
Kazuko Takahashi, Hiroya Takamura, Manabu Okumura
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 2 months ago
Ranking - Methods for Flexible Evaluation and Efficient Comparison of Classification Performance
We present the notion of Ranking for evaluation of two-class classifiers. Ranking is based on using the ordering information contained in the output of a scoring model, rather tha...
Saharon Rosset
UIALL
2004
Springer
15 years 3 months ago
Multimodal Interaction in Architectural Design Applications
In this paper we report on ongoing experiments with an advanced multimodal system for applications in architectural design. The system supports uninformed users in entering the rel...
Lou Boves, Andre Neumann, Louis Vuurpijl, Louis te...
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
15 years 3 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
15 years 7 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu