Sciweavers

743 search results - page 56 / 149
» Performance Measurements for Privacy Preserving Data Mining
Sort
View
ADMA
2008
Springer
483views Data Mining» more  ADMA 2008»
15 years 11 months ago
A Comparative Study of Correlation Measurements for Searching Similar Tags
In recent years, folksonomy becomes a hot topic in many research fields such as complex systems, information retrieval, and recommending systems. It is essential to study the seman...
Kaikuo Xu, Yu Chen, Yexi Jiang, Rong Tang, Yintian...
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 11 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
JCP
2007
121views more  JCP 2007»
15 years 4 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
JSAI
2001
Springer
15 years 9 months ago
Basket Analysis on Meningitis Data
Basket Analysis is the most representative approach in recent study of data mining. However, it cannot be directly applied to the data including numeric data. In this paper, we cl...
Takayuki Ikeda, Takashi Washio, Hiroshi Motoda
CCS
2009
ACM
15 years 11 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...