Sciweavers

2705 search results - page 73 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
RTCSA
2007
IEEE
14 years 3 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
DEXAW
1999
IEEE
97views Database» more  DEXAW 1999»
14 years 1 months ago
Mining Several Data Bases with an Ensemble of Classifiers
The results of knowledge discovery in databases could vary depending on the data mining method. There are several ways to select the most appropriate data mining method dynamicall...
Seppo Puuronen, Vagan Y. Terziyan, Alexander Logvi...
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
14 years 9 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
DGO
2003
137views Education» more  DGO 2003»
13 years 10 months ago
Time-Series Data Mining in a Geospatial Decision Support
This paper presents an overview of the motivation for, and the use of time-series data mining in, a Geospatial Decision Support System (GDSS). Our approach is based on a combinati...
Dan Li, Sherri K. Harms, Steve Goddard, William J....
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
14 years 9 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han