Sciweavers

2705 search results - page 142 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CDVE
2007
Springer
165views Visualization» more  CDVE 2007»
14 years 4 months ago
Private Data Management in Collaborative Environments
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of informatio...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
IDEAL
2005
Springer
14 years 3 months ago
Probabilistic Data Generation for Deduplication and Data Linkage
Abstract. In many data mining projects the data to be analysed contains personal information, like names and addresses. Cleaning and preprocessing of such data likely involves dedu...
Peter Christen
LREC
2010
150views Education» more  LREC 2010»
13 years 11 months ago
Detection of Peculiar Examples using LOF and One Class SVM
This paper proposes the method to detect peculiar examples of the target word from a corpus. The peculiar example is regarded as an outlier in the given example set. Therefore we ...
Hiroyuki Shinnou, Minoru Sasaki
BMCBI
2006
195views more  BMCBI 2006»
13 years 10 months ago
Hubs of knowledge: using the functional link structure in Biozon to mine for biologically significant entities
Background: Existing biological databases support a variety of queries such as keyword or definition search. However, they do not provide any measure of relevance for the instance...
Paul Shafer, Timothy Isganitis, Golan Yona
KDD
2004
ACM
148views Data Mining» more  KDD 2004»
14 years 10 months ago
Interestingness of frequent itemsets using Bayesian networks as background knowledge
The paper presents a method for pruning frequent itemsets based on background knowledge represented by a Bayesian network. The interestingness of an itemset is defined as the abso...
Szymon Jaroszewicz, Dan A. Simovici