Sciweavers

601 search results - page 93 / 121
» Maintaining Data Privacy in Association Rule Mining
Sort
View
KDD
2004
ACM
171views Data Mining» more  KDD 2004»
14 years 9 months ago
Integrating Web Conceptual Modeling and Web Usage Mining
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
13 years 10 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
ICANN
2005
Springer
14 years 2 months ago
Principles of Employing a Self-organizing Map as a Frequent Itemset Miner
This work proposes a theoretical guideline in the specific area of Frequent Itemset Mining (FIM). It supports the hypothesis that the use of neural network technology for the prob...
Vicente O. Baez-Monroy, Simon O'Keefe
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
DSS
2007
226views more  DSS 2007»
13 years 8 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri