Sciweavers

2705 search results - page 40 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
13 years 9 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
SAC
2010
ACM
14 years 2 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
ICCS
2007
Springer
14 years 1 months ago
Inaccuracies of Shape Averaging Method Using Dynamic Time Warping for Time Series Data
Shape averaging or signal averaging of time series data is one of the prevalent subroutines in data mining tasks, where Dynamic Time Warping distance measure (DTW) is known to work...
Vit Niennattrakul, Chotirat Ann Ratanamahatana
ICDM
2008
IEEE
148views Data Mining» more  ICDM 2008»
14 years 2 months ago
Formal Models for Expert Finding on DBLP Bibliography Data
Finding relevant experts in a specific field is often crucial for consulting, both in industry and in academia. The aim of this paper is to address the expert-finding task in a...
Hongbo Deng, Irwin King, Michael R. Lyu
APBC
2004
132views Bioinformatics» more  APBC 2004»
13 years 9 months ago
Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques
Undiscovered relationships in a data set may confound analyses, particularly those that assume data independence. Such problems occur when characters used for phylogenetic analyse...
Anne M. Maglia, Jennifer L. Leopold, Venkat Ram Gh...