Sciweavers

2705 search results - page 53 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
IKE
2010
13 years 7 months ago
Potential Application of Contextual Information Processing To Data Mining
Contextual processing is a new emerging field based on the notion that information surrounding an event lends new meaning to the interpretation of the event. Data mining is the pr...
Gregory Vert, Anitha Chennamaneni, S. Sitharama Iy...
CCS
2009
ACM
14 years 9 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 9 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
IEEEARES
2008
IEEE
14 years 3 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
ICDM
2009
IEEE
108views Data Mining» more  ICDM 2009»
14 years 3 months ago
RING: An Integrated Method for Frequent Representative Subgraph Mining
—We propose a novel representative based subgraph mining model. A series of standards and methods are proposed to select invariants. Patterns are mapped into invariant vectors in...
Shijie Zhang, Jiong Yang, Shirong Li