Sciweavers

269 search results - page 24 / 54
» Novel Algorithms for Privacy Preserving Utility Mining
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 8 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
BMCBI
2008
146views more  BMCBI 2008»
13 years 7 months ago
ProLoc-GO: Utilizing informative Gene Ontology terms for sequence-based prediction of protein subcellular localization
Background: Gene Ontology (GO) annotation, which describes the function of genes and gene products across species, has recently been used to predict protein subcellular and subnuc...
Wen-Lin Huang, Chun-Wei Tung, Shih-Wen Ho, Shiow-F...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 5 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
DAWAK
2004
Springer
14 years 23 days ago
Algorithms for Discovery of Frequent Superset, Rather than Frequent Subset
Abstract. In this paper, we propose a novel mining task: mining frequent superset from the database of itemsets that is useful in bioinformatics, e-learning systems, jobshop schedu...
Zhung-Xun Liao, Man-Kwan Shan
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
14 years 1 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...