Sciweavers

446 search results - page 38 / 90
» Randomization in Privacy-Preserving Data Mining
Sort
View
SIGSOFT
2007
ACM
14 years 10 months ago
Recommending random walks
We improve on previous recommender systems by taking advantage of the layered structure of software. We use a random-walk approach, mimicking the more focused behavior of a develo...
Zachary M. Saul, Vladimir Filkov, Premkumar T. Dev...
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 11 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
14 years 4 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
PAKDD
2005
ACM
180views Data Mining» more  PAKDD 2005»
14 years 3 months ago
Conditional Random Fields for Transmembrane Helix Prediction
Abstract. It is estimated that 20% of genes in the human genome encode for integral membrane proteins (IMPs) and some estimates are much higher. IMPs control a broad range of event...
Lior Lukov, Sanjay Chawla, W. Bret Church
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 10 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright