Sciweavers

2705 search results - page 104 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ZUM
1998
Springer
111views Formal Methods» more  ZUM 1998»
14 years 1 months ago
Combining Specification Techniques for Processes, Data and Time
Abstract. We present a new combination CSP-OZ-DC of three well researched formal techniques for the specification of processes, data and time: CSP [17], Object-Z [36], and Duration...
Ernst-Rüdiger Olderog
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
14 years 26 days ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
KDD
1995
ACM
67views Data Mining» more  KDD 1995»
14 years 20 days ago
A Perspective on Databases and Data Mining
We discuss the use of database met hods for data mining. Recently impressive results have been achieved for some data mining problems using highly specialized and clever data stru...
Marcel Holsheimer, Martin L. Kersten, Heikki Manni...
ICDM
2007
IEEE
97views Data Mining» more  ICDM 2007»
14 years 3 months ago
Supervised Learning by Training on Aggregate Outputs
Supervised learning is a classic data mining problem where one wishes to be be able to predict an output value associated with a particular input vector. We present a new twist on...
David R. Musicant, Janara M. Christensen, Jamie F....
DKE
2006
84views more  DKE 2006»
13 years 9 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...