Sciweavers

7163 search results - page 177 / 1433
» Privacy-Preserving Data Mining
Sort
View
DKE
2008
98views more  DKE 2008»
15 years 5 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
AUSDM
2006
Springer
122views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Analysis of Breast Feeding Data Using Data Mining Methods
The purpose of this study is to demonstrate the benefit of using common data mining techniques on survey data where statistical analysis is routinely applied. The statistical surv...
Hongxing He, Huidong Jin, Jie Chen, Damien McAulla...
128
Voted
PAKDD
2004
ACM
164views Data Mining» more  PAKDD 2004»
15 years 10 months ago
FP-Bonsai: The Art of Growing and Pruning Small FP-Trees
Abstract. In the context of mining frequent itemsets, numerous strategies have been proposed to push several types of constraints within the most well known algorithms. In this pap...
Francesco Bonchi, Bart Goethals
160
Voted
SDM
2004
SIAM
271views Data Mining» more  SDM 2004»
15 years 6 months ago
A Foundational Approach to Mining Itemset Utilities from Databases
Most approaches to mining association rules implicitly consider the utilities of the itemsets to be equal. We assume that the utilities of itemsets may differ, and identify the hi...
Hong Yao, Howard J. Hamilton, Cory J. Butz
KDD
2006
ACM
136views Data Mining» more  KDD 2006»
16 years 5 months ago
Mining quantitative correlated patterns using an information-theoretic approach
Existing research on mining quantitative databases mainly focuses on mining associations. However, mining associations is too expensive to be practical in many cases. In this pape...
Yiping Ke, James Cheng, Wilfred Ng