Sciweavers

1231 search results - page 138 / 247
» Association Rules
Sort
View
PODS
2003
ACM
156views Database» more  PODS 2003»
14 years 9 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
MOBIDE
2010
ACM
13 years 9 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
DEXA
2009
Springer
167views Database» more  DEXA 2009»
14 years 3 months ago
Analyses and Validation of Conditional Dependencies with Built-in Predicates
Abstract. This paper proposes a natural extension of conditional functional dependencies (cfds [14]) and conditional inclusion dependencies (cinds [8]), denoted by cfdp s and cindp...
Wenguang Chen, Wenfei Fan, Shuai Ma
CONCUR
2003
Springer
14 years 2 months ago
A Process-Algebraic Language for Probabilistic I/O Automata
We present a process-algebraic language for Probabilistic I/O Automata (PIOA). To ensure that PIOA specifications given in our language satisfy the “input-enabled” property, w...
Eugene W. Stark, Rance Cleaveland, Scott A. Smolka
CCE
2008
13 years 9 months ago
Bidirectional branch and bound for controlled variable selection: Part I. Principles and minimum singular value criterion
The minimum singular value (MSV) rule is a useful tool for selecting controlled variables (CVs) from the available measurements. However, the application of the MSV rule to large-...
Yi Cao, Vinay Kariwala