Sciweavers

1701 search results - page 25 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
15 years 10 months ago
CFI-Stream: mining closed frequent itemsets in data streams
Mining frequent closed itemsets provides complete and condensed information for non-redundant association rules generation. Extensive studies have been done on mining frequent clo...
Nan Jiang, Le Gruenwald
AAAI
2010
14 years 11 months ago
Constraint Programming for Data Mining and Machine Learning
Machine learning and data mining have become aware that using constraints when learning patterns and rules can be very useful. To this end, a large number of special purpose syste...
Luc De Raedt, Tias Guns, Siegfried Nijssen
74
Voted
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
15 years 10 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
WISE
2002
Springer
15 years 2 months ago
An XML Specification Language to Support a Virtual Marketplace of Data Mining E-Services
The emergence of Application Service Providers (ASP) hosting Internet-based data mining services is being seen as a viable alternative for organisations that value their knowledge...
Shonali Krishnaswamy, E. P. See, J. N. Ho, W. Guna...
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
14 years 7 months ago
The Flexible Climate Data Analysis Tools (CDAT) for Multi-model Climate Simulation Data
Being able to incorporate, inspect, and analyze data with newly developed technologies, diagnostics, and visualizations in an easy and flexible way has been a longstanding challen...
Dean N. Williams, Charles M. Doutriaux, Robert S. ...