Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
—The strategies for mining frequent itemsets, which is the essential part of discovering association rules, have been widely studied over the last decade. In real-world datasets,...
In this paperwedescribe the prototypeof a yellowpageservice for customersin a distributed cyber-shoppingmall. This application combines distributed data miningwith agent technolog...
Yugyung Lee, James Geller, Eun Kyo Park, Changgyu ...
In recent years, the weakness of the canonical support-confidence framework for associations mining has been widely studied. One of the difficulties in applying association rules ...