Sciweavers

2705 search results - page 47 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
PAKDD
2001
ACM
148views Data Mining» more  PAKDD 2001»
14 years 1 months ago
Scalable Hierarchical Clustering Method for Sequences of Categorical Values
Data clustering methods have many applications in the area of data mining. Traditional clustering algorithms deal with quantitative or categorical data points. However, there exist...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 11 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
TNN
1998
121views more  TNN 1998»
13 years 8 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
DMKD
2004
ACM
115views Data Mining» more  DMKD 2004»
14 years 2 months ago
Privacy-preserving data integration and sharing
Integrating data from multiple sources has been a longstanding challenge in the database community. Techniques such as privacy-preserving data mining promises privacy, but assume ...
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gun...
NCA
2007
IEEE
13 years 8 months ago
Handling of incomplete data sets using ICA and SOM in data mining
Based on independent component analysis (ICA) and self-organizing maps (SOM), this paper proposes an ISOM-DH model for the incomplete data’s handling in data mining. Under these ...
Hongyi Peng, Siming Zhu