Sciweavers

601 search results - page 21 / 121
» Maintaining Data Privacy in Association Rule Mining
Sort
View
WPES
2005
ACM
14 years 2 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
NBIS
2010
Springer
13 years 6 months ago
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada
SDM
2004
SIAM
163views Data Mining» more  SDM 2004»
13 years 10 months ago
Basic Association Rules
Previous approaches for mining association rules generate large sets of association rules. Such sets are difficult for users to understand and manage. Here, the concept of a restri...
Guichong Li, Howard J. Hamilton
DSS
2007
127views more  DSS 2007»
13 years 8 months ago
Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining
We present two algorithms for learning large-scale gene regulatory networks from microarray data: a modified informationtheory-based Bayesian network algorithm and a modified asso...
Zan Huang, Jiexun Li, Hua Su, George S. Watts, Hsi...
CORR
2010
Springer
161views Education» more  CORR 2010»
13 years 9 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...