Sciweavers

1701 search results - page 68 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2006
ACM
160views Data Mining» more  KDD 2006»
15 years 10 months ago
Coherent closed quasi-clique discovery from large dense graph databases
Frequent coherent subgraphscan provide valuable knowledgeabout the underlying internal structure of a graph database, and mining frequently occurring coherent subgraphs from large...
Zhiping Zeng, Jianyong Wang, Lizhu Zhou, George Ka...
ICDM
2009
IEEE
138views Data Mining» more  ICDM 2009»
14 years 7 months ago
Semantic-Rich Markov Models for Web Prefetching
Abstract--Domain knowledge for web applications is currently being made available as domain ontology with the advent of the semantic web, in which semantics govern relationships am...
Nizar R. Mabroukeh, Christie I. Ezeife
JIIS
2000
119views more  JIIS 2000»
14 years 9 months ago
Knowledge Discovery from Series of Interval Events
Knowledge discovery from data sets can be extensively automated by using data mining software tools. Techniques for mining series of interval events, however, have not been conside...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
WPES
2003
ACM
15 years 3 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
KDD
1998
ACM
442views Data Mining» more  KDD 1998»
15 years 2 months ago
BAYDA: Software for Bayesian Classification and Feature Selection
BAYDA is a software package for flexible data analysis in predictive data mining tasks. The mathematical model underlying the program is based on a simple Bayesian network, the Na...
Petri Kontkanen, Petri Myllymäki, Tomi Siland...