Sciweavers

1701 search results - page 27 / 341
» Providing k-anonymity in data mining
Sort
View
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
15 years 2 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
74
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
15 years 10 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
112
Voted
WWW
2011
ACM
14 years 4 months ago
Domain-independent entity extraction from web search query logs
Query logs of a Web search engine have been increasingly used as a vital source for data mining. This paper presents a study on largescale domain-independent entity extraction fro...
Alpa Jain, Marco Pennacchiotti
PAMI
2011
14 years 4 months ago
Action Recognition Using Mined Hierarchical Compound Features
—The field of Action Recognition has seen a large increase in activity in recent years. Much of the progress has been through incorporating ideas from single frame object recogn...
Andrew Gilbert, John Illingworth, Richard Bowden
AIMSA
2004
Springer
15 years 3 months ago
PubMiner: Machine Learning-Based Text Mining System for Biomedical Information Mining
PubMiner, an intelligent machine learning based text mining system for mining biological information from the literature is introduced. PubMiner utilize natural language processing...
Jae-Hong Eom, Byoung-Tak Zhang