Sciweavers

2705 search results - page 195 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 11 months ago
Mining long-term search history to improve search accuracy
Long-term search history contains rich information about a user's search preferences. In this paper, we study statistical language modeling based methods to mine contextual i...
Bin Tan, Xuehua Shen, ChengXiang Zhai
ESORICS
2007
Springer
14 years 2 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
JIB
2007
88views more  JIB 2007»
13 years 10 months ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal
ICDE
1998
IEEE
108views Database» more  ICDE 1998»
15 years 2 days ago
Efficient Discovery of Functional and Approximate Dependencies Using Partitions
Discovery of functionaldependencies from relations has been identified as an important database analysis technique. In this paper, we present a new approach for finding functional...
Ykä Huhtala, Juha Kärkkäinen, Pasi ...
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 3 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu