Sciweavers

1701 search results - page 110 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
15 years 3 months ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
KDD
2006
ACM
142views Data Mining» more  KDD 2006»
15 years 10 months ago
Mining distance-based outliers from large databases in any metric space
Let R be a set of objects. An object o R is an outlier, if there exist less than k objects in R whose distances to o are at most r. The values of k, r, and the distance metric ar...
Yufei Tao, Xiaokui Xiao, Shuigeng Zhou
DEXA
2005
Springer
160views Database» more  DEXA 2005»
15 years 3 months ago
Improved Sequential Pattern Mining Using an Extended Bitmap Representation
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns. For solving this problem, SPAM algorithm wa...
Chien-Liang Wu, Jia-Ling Koh, Pao-Ying An
ICTAI
2003
IEEE
15 years 3 months ago
Genetic Algorithm Calibration of Probabilistic Cellular Automata for Modeling Mining Permit Activity
We use a genetic algorithm to calibrate a spatially and temporally resolved cellular automata to model mining activity on public land in Idaho and western Montana. The genetic alg...
Sushil J. Louis, Gary L. Raines
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
15 years 2 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan