Sciweavers

1701 search results - page 270 / 341
» Providing k-anonymity in data mining
Sort
View
ASIACRYPT
2005
Springer
14 years 3 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
GECCO
2004
Springer
14 years 3 months ago
GA-Facilitated Knowledge Discovery and Pattern Recognition Optimization Applied to the Biochemistry of Protein Solvation
Abstract. The authors present a GA optimization technique for cosinebased k-nearest neighbors classification that improves predictive accuracy in a class-balanced manner while sim...
Michael R. Peterson, Travis E. Doom, Michael L. Ra...
AI
2001
Springer
14 years 2 months ago
Learning Bayesian Belief Network Classifiers: Algorithms and System
Abstract. This paper investigates the methods for learning predictive classifiers based on Bayesian belief networks (BN) – primarily unrestricted Bayesian networks and Bayesian m...
Jie Cheng, Russell Greiner
EKAW
2006
Springer
14 years 1 months ago
Iterative Bayesian Network Implementation by Using Annotated Association Rules
Abstract. This paper concerns the iterative implementation of a knowledge model in a data mining context. Our approach relies on coupling a Bayesian network design with an associat...
Clément Fauré, Sylvie Delprat, Jean-...
ESA
2008
Springer
130views Algorithms» more  ESA 2008»
13 years 11 months ago
Linear Time Planarity Testing and Embedding of Strongly Connected Cyclic Level Graphs
Abstract. A level graph is a directed acyclic graph with a level assignment for each node. Such graphs play a prominent role in graph drawing. They express strict dependencies and ...
Christian Bachmaier, Wolfgang Brunner