Sciweavers

1768 search results - page 105 / 354
» Mining Very Large Databases
Sort
View
135
Voted
DIS
2004
Springer
15 years 6 months ago
An Efficient Algorithm for Enumerating Closed Patterns in Transaction Databases
: The class of closed patterns is a well known condensed representations of frequent patterns, and have recently attracted considerable interest. In this paper, we propose an effic...
Takeaki Uno, Tatsuya Asai, Yuzo Uchida, Hiroki Ari...
TCSV
2008
150views more  TCSV 2008»
15 years 2 months ago
Mining Recurring Events Through Forest Growing
Recurring events are short temporal patterns that consist of multiple instances in the target database. Without any a priori knowledge of the recurring events, in terms of their le...
Junsong Yuan, Jingjing Meng, Ying Wu, Jiebo Luo
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 9 months ago
A Genetic Approach to Multivariate Microaggregation for Database Privacy
Microaggregation is a technique used to protect privacy in databases and location-based services. We propose a new hybrid technique for multivariate microaggregation. Our techniqu...
Antoni Martínez-Ballesté, Agusti Sol...
PODS
2001
ACM
148views Database» more  PODS 2001»
16 years 2 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
ICALP
2005
Springer
15 years 8 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan