Sciweavers

2705 search results - page 81 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
SAC
2006
ACM
14 years 3 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 3 months ago
Preprocessing DNS Log Data for Effective Data Mining
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
IAJIT
2010
155views more  IAJIT 2010»
13 years 6 months ago
Evaluation of text clustering methods using wordnet
: The increasing number of digitized texts presently available notably on the Web has developed an acute need in text mining techniques. Clustering systems are used more and more o...
Abdelmalek Amine, Zakaria Elberrichi, Michel Simon...
ICFCA
2010
Springer
14 years 1 months ago
A Survey of Hybrid Representations of Concept Lattices in Conceptual Knowledge Processing
A feature of Formal Concept Analysis is the use of the line diagram of the concept lattice to visualize a conceptual space. The line diagram is a specialized form of Hasse diagram ...
Peter W. Eklund, Jean Villerd
PAKDD
2005
ACM
142views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Dynamic Cluster Formation Using Level Set Methods
Density-based clustering has the advantages for (i) allowing arbitrary shape of cluster and (ii) not requiring the number of clusters as input. However, when clusters touch each o...
Andy M. Yip, Chris H. Q. Ding, Tony F. Chan