Sciweavers

1701 search results - page 49 / 341
» Providing k-anonymity in data mining
Sort
View
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
14 years 11 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
FGCS
2007
86views more  FGCS 2007»
14 years 9 months ago
A grid-based approach for enterprise-scale data mining
Abstract— We describe a grid-based approach for enterprisescale data mining that leverages database technology for I/O parallelism, and on-demand compute servers for compute para...
Ramesh Natarajan, Radu Sion, Thomas Phan
IIE
2008
98views more  IIE 2008»
14 years 9 months ago
Data Mining Application in Higher Learning Institutions
One of the biggest challenges that higher learning institutions face today is to improve the quality of managerial decisions. The managerial decision making process becomes more co...
Naeimeh Delavari, Somnuk Phon-Amnuaisuk, M. Reza B...
ADC
2008
Springer
156views Database» more  ADC 2008»
15 years 4 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang
BTW
1999
Springer
157views Database» more  BTW 1999»
15 years 2 months ago
Database Primitives for Spatial Data Mining
Abstract: Spatial data mining algorithms heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a singl...
Martin Ester, Stefan Grundlach, Hans-Peter Kriegel...