Sciweavers

1701 search results - page 251 / 341
» Providing k-anonymity in data mining
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
EVOW
2003
Springer
14 years 3 months ago
Comparison of AdaBoost and Genetic Programming for Combining Neural Networks for Drug Discovery
Genetic programming (GP) based data fusion and AdaBoost can both improve in vitro prediction of Cytochrome P450 activity by combining artificial neural networks (ANN). Pharmaceuti...
William B. Langdon, S. J. Barrett, Bernard F. Buxt...
KDD
2007
ACM
181views Data Mining» more  KDD 2007»
14 years 10 months ago
BoostCluster: boosting clustering by pairwise constraints
Data clustering is an important task in many disciplines. A large number of studies have attempted to improve clustering by using the side information that is often encoded as pai...
Yi Liu, Rong Jin, Anil K. Jain
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
14 years 10 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
KDD
2009
ACM
305views Data Mining» more  KDD 2009»
14 years 10 months ago
Grocery shopping recommendations based on basket-sensitive random walk
We describe a recommender system in the domain of grocery shopping. While recommender systems have been widely studied, this is mostly in relation to leisure products (e.g. movies...
Ming Li, M. Benjamin Dias, Ian H. Jarman, Wael El-...