Sciweavers

1701 search results - page 14 / 341
» Providing k-anonymity in data mining
Sort
View
97
Voted
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 2 days ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
ML
2010
ACM
138views Machine Learning» more  ML 2010»
14 years 4 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla
ICDM
2006
IEEE
140views Data Mining» more  ICDM 2006»
15 years 3 months ago
Mining the Future: Predicting Itemsets' Support of Association Rules Mining
This paper proposes a novel research dimension in the field of data mining, which is mining the future data before its arrival, or in other words: predicting association rules ahe...
Shenoda Guirguis, Khalil M. Ahmed, Nagwa M. El-Mak...
EDBT
2004
ACM
234views Database» more  EDBT 2004»
15 years 9 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu