Sciweavers

2705 search results - page 114 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 1 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
EDM
2009
110views Data Mining» more  EDM 2009»
13 years 7 months ago
Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions o
A basic question of instructional interventions is how effective it is in promoting student learning. This paper presents a study to determine the relative efficacy of different in...
Mingyu Feng, Joseph Beck, Neil T. Heffernan
AIME
2005
Springer
14 years 2 months ago
Mining Clinical Data: Selecting Decision Support Algorithm for the MET-AP System
We have developed an algorithm for triaging acute pediatric abdominal pain in the Emergency Department using the discovery-driven approach. This algorithm is embedded into the MET-...
Jerzy Blaszczynski, Ken Farion, Wojtek Michalowski...
AMW
2010
13 years 10 months ago
Robust Clustering of Data Streams using Incremental Optimization
Discovering the patterns in evolving data streams is a very important and challenging task. In many applications, it is useful to detect the dierent patterns evolving over time and...
Basheer Hawwash, Olfa Nasraoui
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 9 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi