Sciweavers

1512 search results - page 81 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
113
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 8 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
KDD
2004
ACM
154views Data Mining» more  KDD 2004»
15 years 10 months ago
Diagnosing extrapolation: tree-based density estimation
There has historically been very little concern with extrapolation in Machine Learning, yet extrapolation can be critical to diagnose. Predictor functions are almost always learne...
Giles Hooker
COLCOM
2009
IEEE
15 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
IJCNN
2006
IEEE
15 years 3 months ago
Nominal-scale Evolving Connectionist Systems
— A method is presented for extending the Evolving Connectionist System (ECoS) algorithm that allows it to explicitly represent and learn nominal-scale data without the need for ...
Michael J. Watts
JISE
2008
108views more  JISE 2008»
14 years 9 months ago
Efficient Discovery of Frequent Continuities by Projected Window List Technology
Mining frequent patterns in databases is a fundamental and essential problem in data mining research. A continuity is a kind of causal relationship which describes a definite temp...
Kuo-Yu Huang, Chia-Hui Chang, Kuo-Zui Lin