Sciweavers

7163 search results - page 193 / 1433
» Privacy-Preserving Data Mining
Sort
View
EDBT
2008
ACM
206views Database» more  EDBT 2008»
16 years 5 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
ICDM
2006
IEEE
140views Data Mining» more  ICDM 2006»
15 years 11 months ago
Mining the Future: Predicting Itemsets' Support of Association Rules Mining
This paper proposes a novel research dimension in the field of data mining, which is mining the future data before its arrival, or in other words: predicting association rules ahe...
Shenoda Guirguis, Khalil M. Ahmed, Nagwa M. El-Mak...
153
Voted
SDM
2012
SIAM
234views Data Mining» more  SDM 2012»
13 years 7 months ago
Monitoring and Mining Insect Sounds in Visual Space
Monitoring animals by the sounds they produce is an important and challenging task, whether the application is outdoors in a natural habitat, or in the controlled environment of a...
Yuan Hao, Bilson J. L. Campana, Eamonn J. Keogh
155
Voted
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 9 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
NDSS
2008
IEEE
15 years 11 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters