Sciweavers

1701 search results - page 9 / 341
» Providing k-anonymity in data mining
Sort
View
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui
63
Voted
DMKDTTT
2004
110views Data Mining» more  DMKDTTT 2004»
15 years 23 hour ago
XML algebras for data mining
The XML is a new standard for data representation and exchange on the Internet. There are studies on XML query languages as well as XML algebras in literature. However, attention ...
Ming Zhang, Jingtao Yao
SIGSOFT
2010
ACM
14 years 7 months ago
Software intelligence: the future of mining software engineering data
Mining software engineering data has emerged as a successful research direction over the past decade. In this position paper, we advocate Software Intelligence (SI) as the future ...
Ahmed E. Hassan, Tao Xie
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 6 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
FAST
2009
14 years 7 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte