Sciweavers

1701 search results - page 78 / 341
» Providing k-anonymity in data mining
Sort
View
HICSS
2010
IEEE
258views Biometrics» more  HICSS 2010»
14 years 10 months ago
An Empirical Comparison of Four Text Mining Methods
The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various...
Sangno Lee, Jeff Baker, Jaeki Song, James C. Wethe...
JMLR
2010
116views more  JMLR 2010»
14 years 4 months ago
Feature Selection, Association Rules Network and Theory Building
As the size and dimensionality of data sets increase, the task of feature selection has become increasingly important. In this paper we demonstrate how association rules can be us...
Sanjay Chawla
FLAIRS
2006
14 years 11 months ago
Mining the Web to Determine Similarity Between Words, Objects, and Communities
The World Wide Web provides a wealth of data that can be harnessed to help improve information retrieval and increase understanding of the relationships between different entities...
Mehran Sahami
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
14 years 11 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu