Sciweavers

2705 search results - page 83 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 2 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
EDM
2008
288views Data Mining» more  EDM 2008»
13 years 10 months ago
Data Mining Algorithms to Classify Students
In this paper we compare different data mining methods and techniques for classifying students based on their Moodle usage data and the final marks obtained in their respective cou...
Cristóbal Romero, Sebastián Ventura,...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
14 years 9 months ago
SPIN: mining maximal frequent subgraphs from graph databases
One fundamental challenge for mining recurring subgraphs from semi-structured data sets is the overwhelming abundance of such patterns. In large graph databases, the total number ...
Jun Huan, Wei Wang 0010, Jan Prins, Jiong Yang
CCS
2009
ACM
14 years 3 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...