Sciweavers

2705 search results - page 162 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SDMW
2004
Springer
14 years 3 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 4 months ago
Dimension Reduction for Supervised Ordering
Ordered lists of objects are widely used as representational forms. Such ordered objects include Web search results and best-seller lists. Techniques for processing such ordinal d...
Toshihiro Kamishima, Shotaro Akaho
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
14 years 3 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler
ICDM
2010
IEEE
235views Data Mining» more  ICDM 2010»
13 years 7 months ago
Content-Based Methods for Predicting Web-Site Demographic Attributes
Demographic information plays an important role in gaining valuable insights about a web-site's user-base and is used extensively to target online advertisements and promotion...
Santosh Kabbur, Eui-Hong Han, George Karypis
SDM
2008
SIAM
130views Data Mining» more  SDM 2008»
13 years 11 months ago
Mining Sequence Classifiers for Early Prediction
Supervised learning on sequence data, also known as sequence classification, has been well recognized as an important data mining task with many significant applications. Since te...
Zhengzheng Xing, Jian Pei, Guozhu Dong, Philip S. ...