Sciweavers

7163 search results - page 172 / 1433
» Privacy-Preserving Data Mining
Sort
View
CORR
2002
Springer
139views Education» more  CORR 2002»
15 years 4 months ago
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
Currently statistical and artificial neural network methods dominate in financial data mining. Alternative relational (symbolic) data mining methods have shown their effectiveness...
Boris Kovalerchuk, Evgenii Vityaev, H. Yusupov
AUSDM
2007
Springer
76views Data Mining» more  AUSDM 2007»
15 years 10 months ago
Evaluation of a Graduate Level Data Mining Course with Industry Participants
Data mining courses are increasingly being taught at many universities at both undergraduate and graduate levels. This paper reports on a new graduate level data mining course run...
Peter Christen
AAAI
2000
15 years 6 months ago
A Mutually Beneficial Integration of Data Mining and Information Extraction
Text mining concerns applying data mining techniques to unstructured text. Information extraction (IE) is a form of shallow text understanding that locates specific pieces of data...
Un Yong Nahm, Raymond J. Mooney
GRC
2010
IEEE
15 years 2 months ago
Genetic-Fuzzy Data Mining Techniques
This paper surveys some genetic-fuzzy data mining techniques for mining both membership functions and fuzzy association rules. The motivation from crisp mining to fuzzy mining wil...
Tzung-Pei Hong, Chun-Hao Chen, Vincent S. Tseng
VLDB
2008
ACM
148views Database» more  VLDB 2008»
16 years 4 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li