Sciweavers

2705 search results - page 96 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
BMCBI
2008
204views more  BMCBI 2008»
13 years 9 months ago
EST2uni: an open, parallel tool for automated EST analysis and database creation, with a data mining web interface and microarra
Background: Expressed sequence tag (EST) collections are composed of a high number of single-pass, redundant, partial sequences, which need to be processed, clustered, and annotat...
Javier Forment, Francisco Gilabert Villamón...
POPL
2005
ACM
14 years 9 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
13 years 7 months ago
Anonymizing Temporal Data
-- Temporal data are time-critical in that the snapshot at each timestamp must be made available to researchers in a timely fashion. However, due to the limited data, each snapshot...
Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-C...
FUIN
2007
147views more  FUIN 2007»
13 years 9 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
DAWAK
2007
Springer
14 years 3 months ago
Mining Trajectory Patterns Using Hidden Markov Models
Many studies of spatiotemporal pattern discovery partition data space into disjoint cells for effective processing. However, the discovery accuracy of the space-partitioning schem...
Hoyoung Jeung, Heng Tao Shen, Xiaofang Zhou