Sciweavers

177 search results - page 13 / 36
» Using randomized response techniques for privacy-preserving ...
Sort
View
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 6 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
99
Voted
JIB
2010
90views more  JIB 2010»
14 years 8 months ago
Enhancing Data Integration with Text Analysis to Find Proteins Implicated in Plant Stress Response
s text mining techniques over Medline abstracts as a method for accessing both these bodies of evidence in a consistent way. In an example use case, we apply our method to create a...
Keywan Hassani-Pak, Roxane Legaie, Catherine Canev...
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
15 years 11 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
74
Voted
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
15 years 10 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
DMSN
2010
ACM
14 years 10 months ago
DEMS: a data mining based technique to handle missing data in mobile sensor network applications
In Mobile Sensor Network (MSN) applications, sensors move to increase the area of coverage and/or to compensate for the failure of other sensors. In such applications, loss or cor...
Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Han...