Sciweavers

2705 search results - page 178 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 3 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
ICDM
2008
IEEE
99views Data Mining» more  ICDM 2008»
14 years 4 months ago
Finding Good Itemsets by Packing Data
The problem of selecting small groups of itemsets that represent the data well has recently gained a lot of attention. We approach the problem by searching for the itemsets that c...
Nikolaj Tatti, Jilles Vreeken
ACSW
2006
13 years 11 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 10 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
KDD
2004
ACM
112views Data Mining» more  KDD 2004»
14 years 10 months ago
A rank sum test method for informative gene discovery
Finding informative genes from microarray data is an important research problem in bioinformatics research and applications. Most of the existing methods rank features according t...
Lin Deng, Jian Pei, Jinwen Ma, Dik Lun Lee