Sciweavers

2444 search results - page 339 / 489
» A Pattern Based Data Mining Approach
Sort
View
125
Voted
DMIN
2009
222views Data Mining» more  DMIN 2009»
15 years 13 days ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
126
Voted
ICDM
2009
IEEE
156views Data Mining» more  ICDM 2009»
15 years 12 days ago
Scalable Classification in Large Scale Spatiotemporal Domains Applied to Voltage-Sensitive Dye Imaging
We present an approach for learning models that obtain accurate classification of large scale data objects, collected in spatiotemporal domains. The model generation is structured ...
Igor Vainer, Sarit Kraus, Gal A. Kaminka, Hamutal ...
129
Voted
PKDD
2010
Springer
188views Data Mining» more  PKDD 2010»
15 years 1 months ago
Semi-supervised Abstraction-Augmented String Kernel for Multi-level Bio-Relation Extraction
ervised Abstraction-Augmented String Kernel for Multi-Level Bio-Relation Extraction Pavel Kuksa1 , Yanjun Qi2 , Bing Bai2 , Ronan Collobert2 , Jason Weston3 , Vladimir Pavlovic1 , ...
Pavel P. Kuksa, Yanjun Qi, Bing Bai, Ronan Collobe...
151
Voted
DKE
2002
218views more  DKE 2002»
15 years 2 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
117
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 12 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...