Sciweavers

2705 search results - page 60 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
HICSS
2010
IEEE
258views Biometrics» more  HICSS 2010»
13 years 9 months ago
An Empirical Comparison of Four Text Mining Methods
The amount of textual data that is available for researchers and businesses to analyze is increasing at a dramatic rate. This reality has led IS researchers to investigate various...
Sangno Lee, Jeff Baker, Jaeki Song, James C. Wethe...
NLE
2010
100views more  NLE 2010»
13 years 7 months ago
Formal and functional assessment of the pyramid method for summary content evaluation
Pyramid annotation makes it possible to evaluate quantitatively and qualitatively the content of machine-generated (or human) summaries. Evaluation methods must prove themselves a...
Rebecca J. Passonneau
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 3 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
14 years 9 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
14 years 3 months ago
Cross-Mining Binary and Numerical Attributes
We consider the problem of relating itemsets mined on binary attributes of a data set to numerical attributes of the same data. An example is biogeographical data, where the numer...
Gemma C. Garriga, Hannes Heikinheimo, Jouni K. Sep...