Sciweavers

337 search results - page 52 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
KDD
2003
ACM
160views Data Mining» more  KDD 2003»
14 years 9 months ago
Playing hide-and-seek with correlations
We present a method for very high-dimensional correlation analysis. The method relies equally on rigorous search strategies and on human interaction. At each step, the method cons...
Chris Jermaine
DKE
2010
167views more  DKE 2010»
13 years 6 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
NCA
2009
IEEE
14 years 3 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
GPB
2010
231views Solid Modeling» more  GPB 2010»
13 years 6 months ago
Mining Gene Expression Profiles: An Integrated Implementation of Kernel Principal Component Analysis and Singular Value Decompos
The detection of genes that show similar profiles under different experimental conditions is often an initial step in inferring the biological significance of such genes. Visualiz...
Ferran Reverter, Esteban Vegas, Pedro Sánch...
CORR
2010
Springer
200views Education» more  CORR 2010»
13 years 9 months ago
A Multilevel Approach For Nonnegative Matrix Factorization
Nonnegative Matrix Factorization (NMF) is the problem of approximating a nonnegative matrix with the product of two low-rank nonnegative matrices and has been shown to be particul...
Nicolas Gillis, François Glineur