Sciweavers

764 search results - page 47 / 153
» An Overview of Database Mining Techniques
Sort
View
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 5 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
ADMA
2005
Springer
124views Data Mining» more  ADMA 2005»
13 years 10 months ago
Finding All Frequent Patterns Starting from the Closure
Efficient discovery of frequent patterns from large databases is an active research area in data mining with broad applications in industry and deep implications in many areas of d...
Mohammad El-Hajj, Osmar R. Zaïane
FQAS
2000
Springer
115views Database» more  FQAS 2000»
13 years 11 months ago
Weighted Semantic Parsing: A Robust Approach to Interpretation of Natural Language Queries
This paper focuses on a grammar-based approach to semantic interpretation, which combines the notions of robust and weighted parsing. In restricted domains of application in infor...
Afzal Ballim, Vincenzo Pallotta
KDD
2004
ACM
164views Data Mining» more  KDD 2004»
14 years 8 months ago
Ordering patterns by combining opinions from multiple sources
Pattern ordering is an important task in data mining because the number of patterns extracted by standard data mining algorithms often exceeds our capacity to manually analyze the...
Pang-Ning Tan, Rong Jin
ACSW
2004
13 years 9 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic