Sciweavers

2705 search results - page 227 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
124
Voted
DMIN
2006
125views Data Mining» more  DMIN 2006»
15 years 4 months ago
Biomedical Hypothesis Generation and Testing by Evolutionary Computation
- Filtering the immense amount of data available electronically over the World Wide Web is an important task of search engines in data mining applications. Users when performing se...
Robert Kozma, Anna L. Buczak
126
Voted
BMCBI
2006
239views more  BMCBI 2006»
15 years 2 months ago
Applying dynamic Bayesian networks to perturbed gene expression data
Background: A central goal of molecular biology is to understand the regulatory mechanisms of gene transcription and protein synthesis. Because of their solid basis in statistics,...
Norbert Dojer, Anna Gambin, Andrzej Mizera, Bartek...
133
Voted
WPES
2003
ACM
15 years 7 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
131
Voted
DPD
2002
125views more  DPD 2002»
15 years 2 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
134
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 8 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters