Sciweavers

2308 search results - page 378 / 462
» A Perspective on Databases and Data Mining
Sort
View
175
Voted
KDD
2012
ACM
196views Data Mining» more  KDD 2012»
13 years 7 months ago
Chromatic correlation clustering
We study a novel clustering problem in which the pairwise relations between objects are categorical. This problem can be viewed as clustering the vertices of a graph whose edges a...
Francesco Bonchi, Aristides Gionis, Francesco Gull...
247
Voted
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 6 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
122
Voted
WWW
2005
ACM
16 years 5 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
228
Voted
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 11 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 8 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...