Sciweavers

2049 search results - page 340 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 1 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
CIDM
2007
IEEE
15 years 5 months ago
Reactive Query Policies: A Formalism for Planning with Volatile External Information
— To generate plans for collecting data for data mining, an important problem is information volatility during planning: the information needed by the planning system may change ...
Tsz-Chiu Au, Dana S. Nau
WCRE
2007
IEEE
15 years 5 months ago
Quality Assessment Based on Attribute Series of Software Evolution
Defect density and defect prediction are essential for efficient resource allocation in software evolution. In an empirical study we applied data mining techniques for value seri...
Jacek Ratzinger, Harald Gall, Martin Pinzger
CCS
2007
ACM
15 years 5 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
NECO
2000
86views more  NECO 2000»
14 years 10 months ago
A Bayesian Committee Machine
The Bayesian committee machine (BCM) is a novel approach to combining estimators which were trained on different data sets. Although the BCM can be applied to the combination of a...
Volker Tresp