Sciweavers

337 search results - page 51 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
EDBT
2009
ACM
128views Database» more  EDBT 2009»
14 years 21 days ago
HIDE: heterogeneous information DE-identification
While there is an increasing need to share data that may contain personal information, such data sharing must preserve individual privacy without disclosing any identifiable infor...
James J. Gardner, Li Xiong, Kanwei Li, James J. Lu
CADE
2005
Springer
14 years 9 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
PKDD
2010
Springer
158views Data Mining» more  PKDD 2010»
13 years 7 months ago
Learning Sparse Gaussian Markov Networks Using a Greedy Coordinate Ascent Approach
In this paper, we introduce a simple but efficient greedy algorithm, called SINCO, for the Sparse INverse COvariance selection problem, which is equivalent to learning a sparse Ga...
Katya Scheinberg, Irina Rish
ISI
2005
Springer
14 years 2 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 2 months ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...