Sciweavers

2705 search results - page 99 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
WWW
2008
ACM
14 years 9 months ago
Measuring extremal dependencies in web graphs
We analyze dependencies in power law graph data (Web sample, Wikipedia sample and a preferential attachment graph) using statistical inference for multivariate regular variation. ...
Yana Volkovich, Nelly Litvak, Bert Zwart
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
14 years 2 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
VL
2007
IEEE
120views Visual Languages» more  VL 2007»
14 years 3 months ago
Finding Gender Differences in End-User Debugging: A Data Mining Approach
We are currently investigating what types of end user personas (or homogeneous groups in the population) exist and what works for or hinders each in end-user debugging. These pers...
Valentina Grigoreanu
SIGKDD
2002
136views more  SIGKDD 2002»
13 years 8 months ago
A Survey on Wavelet Applications in Data Mining
Recently there has been significant development in the use of wavelet methods in various data mining processes. However, there has been written no comprehensive survey available o...
Tao Li, Qi Li, Shenghuo Zhu, Mitsunori Ogihara