Sciweavers

259 search results - page 9 / 52
» Rules of Thumb in Data Engineering
Sort
View
COMPSAC
2004
IEEE
14 years 9 days ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
COMPSAC
2005
IEEE
13 years 10 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
ECAI
2004
Springer
14 years 1 months ago
Guiding a Theorem Prover with Soft Constraints
Attempts to use finite models to guide the search for proofs by resolution and the like in first order logic all suffer from the need to trade off the expense of generating and m...
John K. Slaney, Arnold Binas, David Price
INCDM
2009
Springer
145views Data Mining» more  INCDM 2009»
14 years 3 months ago
Application of Classification Association Rule Mining for Mammalian Mesenchymal Stem Cell Differentiation
In this paper, data mining is used to analyze the differentiation of mammalian Mesenchymal Stem Cells (MSCs). A database comprising the key parameters which, we believe, influence ...
Weiqi Wang, Yanbo J. Wang, René Baña...
MSR
2005
ACM
14 years 2 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth