Sciweavers

3130 search results - page 208 / 626
» Mining Views: Database Views for Data Mining
Sort
View
COMPSAC
2004
IEEE
15 years 8 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
FMSD
2002
92views more  FMSD 2002»
15 years 4 months ago
A Simple, Object-Based View of Multiprogramming
Object-based sequential programming has had a major impact on software engineering. However, object-based concurrent programming remains elusive as an effective programming tool. T...
Jayadev Misra
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 10 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
CIKM
2009
Springer
15 years 11 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
PCI
2001
Springer
15 years 9 months ago
SEISMO-SURFER: A Prototype for Collecting, Querying, and Mining Seismic Data
Earthquake phenomena constitute a rich source of information over the years. Typically, the frequency of earthquakes worldwide is one every second. Collecting and querying seismic ...
Yannis Theodoridis