Sciweavers

645 search results - page 25 / 129
» A Data Mining Address Book
Sort
View
PAKDD
2010
ACM
275views Data Mining» more  PAKDD 2010»
14 years 14 days ago
Anonymizing Transaction Data by Integrating Suppression and Generalization
Abstract. Privacy protection in publishing transaction data is an important problem. A key feature of transaction data is the extreme sparsity, which renders any single technique i...
Junqiang Liu, Ke Wang
JPDC
2008
134views more  JPDC 2008»
13 years 8 months ago
Middleware for data mining applications on clusters and grids
This paper gives an overview of two middleware systems that have been developed over the last 6 years to address the challenges involved in developing parallel and distributed imp...
Leonid Glimcher, Ruoming Jin, Gagan Agrawal
APCCM
2006
13 years 10 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 8 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
13 years 8 months ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...