Sciweavers

2705 search results - page 82 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 7 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
FMCO
2007
Springer
196views Formal Methods» more  FMCO 2007»
14 years 29 days ago
Coordinating Object Oriented Components Using Data-Flow Networks
We propose a framework for component-based modeling of distributed systems. It provides separation of concerns between computation (in object oriented components), coordination (vi...
Mohammad Mahdi Jaghoori
AUSDM
2006
Springer
202views Data Mining» more  AUSDM 2006»
14 years 25 days ago
A Comparative Study of Classification Methods For Microarray Data Analysis
In response to the rapid development of DNA Microarray technology, many classification methods have been used for Microarray classification. SVMs, decision trees, Bagging, Boostin...
Hong Hu, Jiuyong Li, Ashley W. Plank, Hua Wang, Gr...
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
14 years 9 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
DGO
2004
124views Education» more  DGO 2004»
13 years 10 months ago
Data Confidentiality, Data Quality and Data Integration for Federal Databases
cipal high-level goal of the research is to develop abstractions, theory and methodology and software tools that allow federal statistical agencies to disseminate useful informatio...
Alan F. Karr