Sciweavers

601 search results - page 84 / 121
» Maintaining Data Privacy in Association Rule Mining
Sort
View
WPES
2003
ACM
14 years 1 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
ICEIS
2009
IEEE
14 years 3 months ago
Minable Data Warehouse
Data warehouses have been widely used in various capacities such as large corporations or public institutions. These systems contain large and rich datasets that are often used by ...
David Morgan, Jai W. Kang, James M. Kang
ICDE
2003
IEEE
146views Database» more  ICDE 2003»
14 years 10 months ago
Similarity Search in Sets and Categorical Data Using the Signature Tree
Data mining applications analyze large collections of set data and high dimensional categorical data. Search on these data types is not restricted to the classic problems of minin...
Nikos Mamoulis, David W. Cheung, Wang Lian
EUROISI
2008
13 years 10 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
ICPP
2006
IEEE
14 years 2 months ago
Adaptively Routing P2P Queries Using Association Analysis
Unstructured peer-to-peer networks have become a very popular method for content distribution in the past few years. By not enforcing strict rules on the network’s topology or c...
Brian D. Connelly, Christopher W. Bowron, Li Xiao,...