Sciweavers

114 search results - page 11 / 23
» When do data mining results violate privacy
Sort
View
IMC
2007
ACM
13 years 11 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 10 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
KDD
2004
ACM
211views Data Mining» more  KDD 2004»
14 years 10 months ago
Towards parameter-free data mining
Most data mining algorithms require the setting of many input parameters. Two main dangers of working with parameter-laden algorithms are the following. First, incorrect settings ...
Eamonn J. Keogh, Stefano Lonardi, Chotirat (Ann) R...
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 2 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
KDD
2006
ACM
129views Data Mining» more  KDD 2006»
14 years 10 months ago
Suppressing model overfitting in mining concept-drifting data streams
Mining data streams of changing class distributions is important for real-time business decision support. The stream classifier must evolve to reflect the current class distributi...
Haixun Wang, Jian Yin, Jian Pei, Philip S. Yu, Jef...