Sciweavers

2705 search results - page 64 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
USS
2010
13 years 6 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
BIS
2010
159views Business» more  BIS 2010»
13 years 4 months ago
Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining
Nowadays the software systems, including web portals, are developed from a priori assumptions about how the system will be used. However, frequently these assumptions hold only par...
Jérémy Besson, Ieva Mitasiunaite, Au...
ICDM
2007
IEEE
254views Data Mining» more  ICDM 2007»
14 years 3 months ago
Sampling for Sequential Pattern Mining: From Static Databases to Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery. Recently, with the constant progress in hardware technologies, real-world databases tend to gro...
Chedy Raïssi, Pascal Poncelet
DMIN
2006
239views Data Mining» more  DMIN 2006»
13 years 10 months ago
Mining of Stock Data: Intra- and Inter-Stock Pattern Associative Classification
In this paper, a pattern-based stock data mining approach which transforms the numeric stock data to symbolic sequences, carries out sequential and non-sequential association analy...
Jo Ting, Tak-Chung Fu, Fu-Lai Chung
DATESO
2004
116views Database» more  DATESO 2004»
13 years 10 months ago
Using Blind Search and Formal Concepts for Binary Factor Analysis
Binary Factor Analysis (BFA, also known as Boolean Factor Analysis) may help with understanding collections of binary data. Since we can take collections of text documents as binar...
Ales Keprt