Sciweavers

645 search results - page 34 / 129
» A Data Mining Address Book
Sort
View
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 10 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
14 years 2 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar
ICIC
2005
Springer
14 years 2 months ago
Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning
In recent years, mining with imbalanced data sets receives more and more attentions in both theoretical and practical aspects. This paper introduces the importance of imbalanced da...
Hui Han, Wenyuan Wang, Binghuan Mao
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 3 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
ICDM
2006
IEEE
161views Data Mining» more  ICDM 2006»
14 years 2 months ago
Personalization in Context: Does Context Matter When Building Personalized Customer Models?
The idea that context is important when predicting customer behavior has been maintained by scholars in marketing and data mining. However, no systematic study measuring how much ...
Michele Gorgoglione, Cosimo Palmisano, Alexander T...