Sciweavers

2705 search results - page 77 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
DMIN
2006
144views Data Mining» more  DMIN 2006»
13 years 10 months ago
Discovering Assignment Rules in Workforce Schedules Using Data Mining
Discovering hidden patterns in large sets of workforce schedules to gain insight into the potential knowledge in workforce schedules are crucial to better understanding the workfor...
Jihong Yan
TKDE
2012
215views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
CIKM
2009
Springer
14 years 3 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
ICAI
2009
13 years 6 months ago
Data Mining in Incomplete Numerical and Categorical Data Sets: A Neuro Fuzzy Approach
- There are many applications dealing with incomplete data sets that take different approaches to making imputations for missing values. Most tackle the problem for numerical input...
Pilar Rey del Castillo, Jesus Cardenosa
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor