Sciweavers

1701 search results - page 43 / 341
» Providing k-anonymity in data mining
Sort
View
PODS
2003
ACM
151views Database» more  PODS 2003»
15 years 10 months ago
Feasible itemset distributions in data mining: theory and application
Computing frequent itemsets and maximally frequent itemsets in a database are classic problems in data mining. The resource requirements of all extant algorithms for both problems...
Ganesh Ramesh, William Maniatty, Mohammed Javeed Z...
DMIN
2006
141views Data Mining» more  DMIN 2006»
14 years 11 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...
HAIS
2009
Springer
15 years 2 months ago
A Generic and Extendible Multi-Agent Data Mining Framework
A generic and extendible Multi-Agent Data Mining (MADM) framework, EMADS (the Extendible Multi-Agent Data mining System) is described. The central feature of the framework is that ...
Kamal Ali Albashiri, Frans Coenen
GIS
2008
ACM
15 years 10 months ago
GEDMWA: geospatial exploratory data mining web agent
An abundance of geospatial information is flourishing on the Internet but mining and disseminating these data is a daunting task. With anything published on the web available to t...
Edward Pultar, Martin Raubal, Michael F. Goodchild
SIGMOD
2000
ACM
133views Database» more  SIGMOD 2000»
15 years 2 months ago
Data Mining on an OLTP System (Nearly) for Free
This paper proposes a scheme for scheduling disk requests that takes advantage of the ability of high-level functions to operate directly at individual disk drives. We show that s...
Erik Riedel, Christos Faloutsos, Gregory R. Ganger...