Sciweavers

1701 search results - page 132 / 341
» Providing k-anonymity in data mining
Sort
View
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 10 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
15 years 4 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...
ITNG
2007
IEEE
15 years 4 months ago
SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient In
Medical histories provide a rich resource for diagnoses and treatment. Similarly, consumers’ blog postings on health-related topics offer unique data for medical researchers, pr...
Amy Neustein
SACMAT
2005
ACM
15 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
PKDD
2004
Springer
118views Data Mining» more  PKDD 2004»
15 years 3 months ago
Mining Thick Skylines over Large Databases
Abstract. People recently are interested in a new operator, called skyline [3], which returns the objects that are not dominated by any other objects with regard to certain measure...
Wen Jin, Jiawei Han, Martin Ester