Sciweavers

204 search results - page 15 / 41
» Supporting the Optimisation of Distributed Data Mining by Pr...
Sort
View
WPES
2003
ACM
14 years 26 days ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
ICDCS
2010
IEEE
13 years 11 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
OSDI
2008
ACM
14 years 8 months ago
Carnegie Mellon's CyDAT: Harnessing a Wide Array of Telemetry Data to Enhance Distributed System Diagnostics
The number and complexity of distributed applications has exploded, and to-date, each has had to create its own method for providing diagnostic tools and performance metrics. Thes...
Chas DiFatta, Mark Poepping, Daniel V. Klein
AISADM
2005
Springer
14 years 1 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
IEEECIT
2010
IEEE
13 years 6 months ago
Term Weighting Approaches for Mining Significant Locations from Personal Location Logs
In this paper, we describe experiments into the application of term weighting techniques from text retrieval to support the automatic identification of significant locations from ...
Zhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Ala...