Sciweavers

8614 search results - page 159 / 1723
» Mining
Sort
View
INTERNET
2008
157views more  INTERNET 2008»
13 years 8 months ago
Digging Deep into the Data Mine with DataMiningGrid
Vlado Stankovski, Martin T. Swain, Valentin Kravts...
KDD
2004
ACM
125views Data Mining» more  KDD 2004»
14 years 8 months ago
Differential Association Rule Mining for the Study of Protein-Protein Interaction Networks
Protein-protein interactions are of great interest to biologists. A variety of high-throughput techniques have been devised, each of which leads to a separate definition of an int...
Christopher Besemann, Anne Denton, Ajay Yekkirala,...
EDBT
2004
ACM
234views Database» more  EDBT 2004»
14 years 8 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 3 months ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham