Sciweavers

69 search results - page 11 / 14
» Efficient Runtime Generation of Association Rules
Sort
View
FPL
2006
Springer
120views Hardware» more  FPL 2006»
14 years 8 days ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
SBACPAD
2003
IEEE
180views Hardware» more  SBACPAD 2003»
14 years 1 months ago
New Parallel Algorithms for Frequent Itemset Mining in Very Large Databases
Frequent itemset mining is a classic problem in data mining. It is a non-supervised process which concerns in finding frequent patterns (or itemsets) hidden in large volumes of d...
Adriano Veloso, Wagner Meira Jr., Srinivasan Parth...
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 8 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
DASFAA
2007
IEEE
234views Database» more  DASFAA 2007»
14 years 3 months ago
Estimating Missing Data in Data Streams
Networks of thousands of sensors present a feasible and economic solution to some of our most challenging problems, such as real-time traffic modeling, military sensing and trackin...
Nan Jiang, Le Gruenwald
DEXA
2006
Springer
129views Database» more  DEXA 2006»
14 years 9 days ago
Selectively Storing XML Data in Relations
This paper presents a new framework for users to select relevant data from an XML document and store it in an existing relational database, as opposed to previous approaches that s...
Wenfei Fan, Lisha Ma