Sciweavers

2705 search results - page 118 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
EDCC
2005
Springer
14 years 2 months ago
A Data Mining Approach to Identify Key Factors in Dependability Experiments
Abstract. Our paper presents a novel approach for identifying the key infrastructural factors determining the behavior of systems in the presence of faults by the application of in...
Gergely Pintér, Henrique Madeira, Marco Vie...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 1 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
14 years 9 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
KDD
2004
ACM
198views Data Mining» more  KDD 2004»
14 years 2 months ago
Mining traffic data from probe-car system for travel time prediction
We are developing a technique to predict travel time of a vehicle for an objective road section, based on real time traffic data collected through a probe-car system. In the area ...
Takayuki Nakata, Jun-ichi Takeuchi
ICDCS
2005
IEEE
14 years 2 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...