Sciweavers

601 search results - page 63 / 121
» Maintaining Data Privacy in Association Rule Mining
Sort
View
SGAI
2007
Springer
14 years 2 months ago
Dynamic Rule Mining for Argumentation Based Systems
Argumentation has proved to be a very influential reasoning mechanism particularly in the context of multi agent systems. In this paper we introduce PADUA (Protocol for Argumenta...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
13 years 10 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 9 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ICDE
2008
IEEE
192views Database» more  ICDE 2008»
14 years 10 months ago
Verifying and Mining Frequent Patterns from Large Windows over Data Streams
Mining frequent itemsets from data streams has proved to be very difficult because of computational complexity and the need for real-time response. In this paper, we introduce a no...
Barzan Mozafari, Hetal Thakkar, Carlo Zaniolo