Sciweavers

2705 search results - page 41 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CSE
2009
IEEE
13 years 8 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
IEEEIAS
2007
IEEE
14 years 2 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
DMIN
2009
121views Data Mining» more  DMIN 2009»
13 years 5 months ago
Data Mining in the Real World: Experiences, Challenges, and Recommendations
Abstract - Data mining is used regularly in a variety of industries and is continuing to gain in both popularity and acceptance. However, applying data mining methods to complex re...
Gary M. Weiss
AISADM
2005
Springer
14 years 1 months ago
A Cooperative Multi-agent Data Mining Model and Its Application to Medical Data on Diabetes
Abstract. We present CoLe, a model for cooperative agents for mining knowledge from heterogeneous data. CoLe allows for the cooperation of different mining agents and the combinat...
Jie Gao, Jörg Denzinger, Robert C. James