Sciweavers

176 search results - page 9 / 36
» Crime Data Mining: A General Framework and Some Examples
Sort
View
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 8 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
ETRICS
2006
13 years 11 months ago
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the...
Jim Dowd, Shouhuai Xu, Weining Zhang
GIS
2000
ACM
13 years 7 months ago
A conceptual framework for incorporating cognitive principles into geographical database representation
The advancement of GIS data models to allow the eOEective utilization of very large heterogeneous geographic databases requires a new approach that incorporates models of human cog...
Jeremy L. Mennis, Donna Peuquet, Liujian Qian
KDD
2008
ACM
182views Data Mining» more  KDD 2008»
14 years 7 months ago
Classification with partial labels
In this paper, we address the problem of learning when some cases are fully labeled while other cases are only partially labeled, in the form of partial labels. Partial labels are...
Nam Nguyen, Rich Caruana
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 8 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny