Sciweavers

764 search results - page 31 / 153
» An Overview of Database Mining Techniques
Sort
View
KDD
2006
ACM
107views Data Mining» more  KDD 2006»
14 years 8 months ago
Out-of-core frequent pattern mining on a commodity PC
In this work we focus on the problem of frequent itemset mining on large, out-of-core data sets. After presenting a characterization of existing out-of-core frequent itemset minin...
Gregory Buehrer, Srinivasan Parthasarathy, Amol Gh...
KDD
1998
ACM
136views Data Mining» more  KDD 1998»
14 years 6 days ago
Integrating Classification and Association Rule Mining
Classification rule mining aims to discover a small set of rules in the database that forms an accurate classifier. Association rule mining finds all the rules existing in the dat...
Bing Liu, Wynne Hsu, Yiming Ma
COMPSAC
2004
IEEE
13 years 11 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
ICDM
2002
IEEE
118views Data Mining» more  ICDM 2002»
14 years 28 days ago
Mining Surveillance Video for Independent Motion Detection
This paper addresses the special applications of data mining techniques in homeland defense. The problem targeted, which is frequently encountered in military/intelligence surveil...
Zhongfei Zhang