Sciweavers

1701 search results - page 108 / 341
» Providing k-anonymity in data mining
Sort
View
ICDE
2005
IEEE
118views Database» more  ICDE 2005»
15 years 11 months ago
A Framework for High-Accuracy Privacy-Preserving Mining
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, ...
Shipra Agrawal, Jayant R. Haritsa
KDD
2001
ACM
237views Data Mining» more  KDD 2001»
15 years 10 months ago
Exploiting Web Log Mining for Web Cache Enhancement
Abstract. Improving the performance of the Web is a crucial requirement, since its popularity resulted in a large increase in the user perceived latency. In this paper, we describe...
Alexandros Nanopoulos, Dimitrios Katsaros, Yannis ...
DASFAA
2006
IEEE
126views Database» more  DASFAA 2006»
15 years 4 months ago
An Efficient Approach for Mining Top-K Fault-Tolerant Repeating Patterns
Abstract. In this paper, an efficient strategy for mining top-K non-trivial faulttolerant repeating patterns (FT-RPs in short) with lengths no less than min_len from data sequences...
Jia-Ling Koh, Yu-Ting Kung
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
15 years 3 months ago
Hot Item Mining and Summarization from Multiple Auction Web Sites
Online auction Web sites are fast changing, highly dynamic, and complex as they involve tremendous sellers and potential buyers, as well as a huge amount of items listed for biddi...
Tak-Lam Wong, Wai Lam
DATAMINE
1998
126views more  DATAMINE 1998»
14 years 9 months ago
An Extension to SQL for Mining Association Rules
Data mining evolved as a collection of applicative problems and efficient solution algorithms relative to rather peculiar problems, all focused on the discovery of relevant infor...
Rosa Meo, Giuseppe Psaila, Stefano Ceri