Sciweavers

1701 search results - page 86 / 341
» Providing k-anonymity in data mining
Sort
View
DAWAK
2005
Springer
15 years 3 months ago
Automatic Selection of Bitmap Join Indexes in Data Warehouses
The queries defined on data warehouses are complex and use several join operations that induce an expensive computational cost. This cost becomes even more prohibitive when querie...
Kamel Aouiche, Jérôme Darmont, Omar B...
SACMAT
2010
ACM
14 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
BTW
2005
Springer
104views Database» more  BTW 2005»
15 years 3 months ago
Maintaining Nonparametric Estimators over Data Streams
Abstract: An effective processing and analysis of data streams is of utmost importance for a plethora of emerging applications like network monitoring, traffic management, and fi...
Björn Blohsfeld, Christoph Heinz, Bernhard Se...
VLDB
1998
ACM
147views Database» more  VLDB 1998»
15 years 2 months ago
Scalable Techniques for Mining Causal Structures
Mining for association rules in market basket data has proved a fruitful areaof research. Measures such as conditional probability (confidence) and correlation have been used to i...
Craig Silverstein, Sergey Brin, Rajeev Motwani, Je...
KAIS
2006
95views more  KAIS 2006»
14 years 9 months ago
Discovering mappings in hierarchical data from multiple sources using the inherent structure
Unprecedented amounts of media data are publicly accessible. However, it is increasingly difficult to integrate relevant media from multiple and diverse sources for effective appli...
K. Selçuk Candan, Jong Wook Kim, Huan Liu, ...