Sciweavers

764 search results - page 62 / 153
» An Overview of Database Mining Techniques
Sort
View
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 8 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
IIE
2008
98views more  IIE 2008»
13 years 8 months ago
Data Mining Application in Higher Learning Institutions
One of the biggest challenges that higher learning institutions face today is to improve the quality of managerial decisions. The managerial decision making process becomes more co...
Naeimeh Delavari, Somnuk Phon-Amnuaisuk, M. Reza B...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 2 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
MADNES
2005
Springer
14 years 1 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 2 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...