Sciweavers

956 search results - page 47 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CCS
2010
ACM
13 years 10 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
IJBIDM
2006
75views more  IJBIDM 2006»
13 years 9 months ago
Web process and workflow path mining using the Multimethod approach
: Workflow Management Systems (WfMS) provide a fundamental technological infrastructure to define and manage business processes efficiently. WfMS logs contain valuable data that ca...
Jorge Cardoso, Mitja Lenic
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 3 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ISI
2008
Springer
13 years 9 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
AISADM
2007
Springer
14 years 4 months ago
Peer-to-Peer Data Mining, Privacy Issues, and Games
Peer-to-Peer (P2P) networks are gaining increasing popularity in many distributed applications such as file-sharing, network storage, web caching, searching and indexing of releva...
Kanishka Bhaduri, Kamalika Das, Hillol Kargupta