Sciweavers

731 search results - page 84 / 147
» Taxonomy-superimposed graph mining
Sort
View
ASIACRYPT
2005
Springer
14 years 3 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
DAWAK
2005
Springer
14 years 3 months ago
Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates
Extract-Transform-Load (ETL) workflows are data centric workflows responsible for transferring, cleaning, and loading data from their respective sources to the warehouse. Previous ...
Alkis Simitsis, Panos Vassiliadis, Manolis Terrovi...
RSFDGRC
2005
Springer
134views Data Mining» more  RSFDGRC 2005»
14 years 3 months ago
The Computational Complexity of Inference Using Rough Set Flow Graphs
Pawlak recently introduced rough set flow graphs (RSFGs) as a graphical framework for reasoning from data. Each rule is associated with three coefficients, which have been shown t...
Cory J. Butz, Wen Yan, Boting Yang
PKDD
2005
Springer
145views Data Mining» more  PKDD 2005»
14 years 3 months ago
A Correspondence Between Maximal Complete Bipartite Subgraphs and Closed Patterns
For an undirected graph ¢ without self-loop, we prove: (i) that the number of closed patterns in the adjacency matrix of ¢ is even; (ii) that the number of the closed patterns i...
Jinyan Li, Haiquan Li, Donny Soh, Limsoon Wong
BNCOD
2004
85views Database» more  BNCOD 2004»
13 years 11 months ago
Database Support for Path Query Functions
Extending relational database functionality to include data mining primitives is one step towards the greater goal of more closely integrated database and mining systems. This pape...
Rachel Hamill, Nigel J. Martin