Sciweavers

2705 search results - page 42 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
CORR
2010
Springer
194views Education» more  CORR 2010»
13 years 4 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
PAKDD
2010
ACM
128views Data Mining» more  PAKDD 2010»
14 years 15 days ago
Privacy-Preserving Network Aggregation
Abstract. Consider the scenario where information about a large network is distributed across several different parties or commercial entities. Intuitively, we would expect that th...
Troy Raeder, Marina Blanton, Nitesh V. Chawla, Kei...
ICDM
2003
IEEE
104views Data Mining» more  ICDM 2003»
14 years 1 months ago
Structure Search and Stability Enhancement of Bayesian Networks
Learning Bayesian network structure from large-scale data sets, without any expertspecified ordering of variables, remains a difficult problem. We propose systematic improvements ...
Hanchuan Peng, Chris H. Q. Ding
ICCS
2000
Springer
13 years 11 months ago
Conceptual Knowledge Discovery and Data Analysis
In this paper, we discuss Conceptual Knowledge Discovery in Databases (CKDD) in its connection with Data Analysis. Our approach is based on Formal Concept Analysis, a mathematical ...
Joachim Hereth Correia, Gerd Stumme, Rudolf Wille,...
DEXA
2005
Springer
93views Database» more  DEXA 2005»
14 years 1 months ago
Provable Data Privacy
In relational database systems a combination of privileges and views is employed to limit a user’s access and to hide non-public data. The data privacy problem is to decide wheth...
Kilian Stoffel, Thomas Studer