Sciweavers

503 search results - page 85 / 101
» Output privacy in data mining
Sort
View
ICICS
2005
Springer
15 years 3 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
ICWSM
2009
14 years 7 months ago
You Are Where You Edit: Locating Wikipedia Contributors through Edit Histories
Whether knowingly or otherwise, Wikipedia contributors reveal their interests and expertise through their contribution patterns. An analysis of Wikipedia edit histories shows that...
Michael D. Lieberman, Jimmy Lin
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
15 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 4 months ago
Non-redundant Multi-view Clustering via Orthogonalization
Typical clustering algorithms output a single clustering of the data. However, in real world applications, data can often be interpreted in many different ways; data can have diff...
Ying Cui, Xiaoli Z. Fern, Jennifer G. Dy
TSE
2008
91views more  TSE 2008»
14 years 9 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra