Sciweavers

1701 search results - page 77 / 341
» Providing k-anonymity in data mining
Sort
View
ISCI
2008
166views more  ISCI 2008»
14 years 9 months ago
Incremental and interactive mining of web traversal patterns
Web mining involves the application of data mining techniques to large amounts of web-related data in order to improve web services. Web traversal pattern mining involves discover...
Yue-Shi Lee, Show-Jane Yen
WEBNET
2000
14 years 11 months ago
Mining the Most Interesting Web Access Associations
: Web access patterns can provide valuable information for website designers in making website-based communication more efficient. To extract interesting or useful web access patte...
Li Shen, Ling Cheng, James Ford, Fillia Makedon, V...
APBC
2006
181views Bioinformatics» more  APBC 2006»
14 years 11 months ago
Analyzing Inconsistency Toward Enhancing Integration of Biological Molecular Databases
: The rapid growth of biological databases not only provides biologists with abundant data but also presents a big challenge in relation to the analysis of data. Many data analysis...
Yi-Ping Phoebe Chen, Qingfeng Chen
74
Voted
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
EDOC
2003
IEEE
15 years 3 months ago
A MOM-based Solution for Remote Monitoring of Equipment in Mines
Today’s autonomous and heterogeneous information systems have an increasing necessity of exchanging data. As widely known, middleware systems have been successfully adopted as i...
Virgínia A. C. Sgotti, Nelson S. Rosa, Well...