Sciweavers

1701 search results - page 48 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2001
ACM
164views Data Mining» more  KDD 2001»
15 years 10 months ago
Data mining criteria for tree-based regression and classification
This paper is concerned with the construction of regression and classification trees that are more adapted to data mining applications than conventional trees. To this end, we pro...
Andreas Buja, Yung-Seop Lee
DEXAW
1998
IEEE
116views Database» more  DEXAW 1998»
15 years 2 months ago
Data-Mining: A Tightly-Coupled Implementation on a Parallel Database Server
Due to the increasingly di culty of discovering patterns in real-world databases using only conventional OLAP tools, an automated process such as data mining is currently essentia...
Mauro Sousa, Marta Mattoso, Nelson F. F. Ebecken
MADNES
2005
Springer
15 years 3 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
60
Voted
ACSC
2005
IEEE
15 years 3 months ago
A Delivery Framework for Health Data Mining and Analytics
The iHealth Explorer tool, developed by CSIRO and DoHA, delivers web services type data mining and analytic facilities over a web interface, providing desktop access to sophistica...
Damien McAullay, Graham J. Williams, Jie Chen, Hui...
IEAAIE
2000
Springer
15 years 1 months ago
Dynamic Data Mining
Business information received from advanced data analysis and data mining is a critical success factor for companies wishing to maximize competitive advantage. The use of tradition...
Vijay V. Raghavan, Aladdin Hafez