Sciweavers

337 search results - page 35 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
MOBISYS
2007
ACM
14 years 8 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
IEAAIE
2009
Springer
14 years 3 months ago
An Efficient Algorithm for Maintaining Frequent Closed Itemsets over Data Stream
Data mining refers to the process of revealing unknown and potentially useful information from a large database. Frequent itemsets mining is one of the foundational problems in dat...
Show-Jane Yen, Yue-Shi Lee, Cheng-Wei Wu, Chin-Lin...
CSE
2009
IEEE
13 years 10 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
CIBB
2008
13 years 10 months ago
Mining Association Rule Bases from Integrated Genomic Data and Annotations
During the last decade, several clustering and association rule mining techniques have been applied to highlight groups of coregulated genes in gene expression data. Nowadays, inte...
Ricardo Martínez, Nicolas Pasquier, Claude ...