Sciweavers

1701 search results - page 129 / 341
» Providing k-anonymity in data mining
Sort
View
PAKDD
2009
ACM
94views Data Mining» more  PAKDD 2009»
15 years 4 months ago
When does Co-training Work in Real Data?
Co-training, a paradigm of semi-supervised learning, may alleviate effectively the data scarcity problem (i.e., the lack of labeled examples) in supervised learning. The standard ...
Charles X. Ling, Jun Du, Zhi-Hua Zhou
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
14 years 8 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
ICDM
2008
IEEE
182views Data Mining» more  ICDM 2008»
15 years 4 months ago
Multiple-Instance Regression with Structured Data
We present a multiple-instance regression algorithm that models internal bag structure to identify the items most relevant to the bag labels. Multiple-instance regression (MIR) op...
Kiri L. Wagstaff, Terran Lane, Alex Roper
ICDE
2007
IEEE
129views Database» more  ICDE 2007»
15 years 4 months ago
Ontology-driven Rule Generalization and Categorization for Market Data
—Radio Frequency Identification (RFID) is an emerging technique that can significantly enhance supply chain processes and deliver customer service improvements. RFID provides use...
Dongwoo Won, Dennis McLeod
ICAD
2004
14 years 11 months ago
Soundserver: Data Sonification On-Demand for Computational Instances
The rapid accumulation of large collections of data has created the need for efficient and intelligent schemes for knowledge extraction and results analysis. The resulting informa...
Jorge Cardoso, Jos Carvalho, Luís Teixeira,...