Sciweavers

337 search results - page 38 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
DAWAK
2005
Springer
13 years 10 months ago
Incremental Data Mining Using Concurrent Online Refresh of Materialized Data Mining Views
Abstract. Data mining is an iterative process. Users issue series of similar data mining queries, in each consecutive run slightly modifying either the definition of the mined dat...
Mikolaj Morzy, Tadeusz Morzy, Marek Wojciechowski,...
AICCSA
2008
IEEE
216views Hardware» more  AICCSA 2008»
13 years 9 months ago
Mining fault tolerant frequent patterns using pattern growth approach
Mining fault tolerant (FT) frequent patterns from transactional datasets are very complex than mining all frequent patterns (itemsets), in terms of both search space exploration a...
Shariq Bashir, Zahid Halim, Abdul Rauf Baig
CHI
2006
ACM
14 years 9 months ago
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applicati
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as th...
Karen P. Tang, Pedram Keyani, James Fogarty, Jason...
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 10 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
VLDB
2005
ACM
136views Database» more  VLDB 2005»
14 years 2 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal