Sciweavers

2705 search results - page 117 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
EDM
2010
152views Data Mining» more  EDM 2010»
13 years 10 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim
CSFW
1999
IEEE
14 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 3 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
GIS
2007
ACM
14 years 10 months ago
Using fuzzy clustering methods for delineating urban housing submarkets
This study investigates whether a fuzzy clustering method is of any practical value in delineating urban housing submarkets relative to clustering methods based on classic (or cri...
Sungsoon Hwang, Jean-Claude Thill
IADIS
2008
13 years 10 months ago
Aggregation in Confidence-Based Concept Discovery for Multi-Relational Data Mining
Multi-relational data mining has become popular due to the limitations of propositional problem definition in structured domains and the tendency of storing data in relational dat...
Yusuf Kavurucu, Pinar Senkul, Ismail Hakki Toroslu