Sciweavers

2346 search results - page 262 / 470
» Discovering Case Knowledge Using Data Mining
Sort
View
EDBT
2010
ACM
145views Database» more  EDBT 2010»
14 years 18 days ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 9 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
HICSS
2010
IEEE
227views Biometrics» more  HICSS 2010»
13 years 9 months ago
Business Value Creation through Business Processes Management and Operational Business Intelligence Integration
Current approaches to Business Process Management (BPM) and Operational Business Intelligence (BI) integration have been very limited and simply reduced to the problem of technica...
Olivera Marjanovic
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 1 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
SAC
2010
ACM
14 years 4 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil