Sciweavers

13913 search results - page 2534 / 2783
» models 2007
Sort
View
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 8 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
ICDM
2007
IEEE
169views Data Mining» more  ICDM 2007»
15 years 8 months ago
Efficient Discovery of Frequent Approximate Sequential Patterns
We propose an efficient algorithm for mining frequent approximate sequential patterns under the Hamming distance model. Our algorithm gains its efficiency by adopting a "brea...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu
ICDM
2007
IEEE
248views Data Mining» more  ICDM 2007»
15 years 8 months ago
Adapting SVM Classifiers to Data with Shifted Distributions
Many data mining applications can benefit from adapting existing classifiers to new data with shifted distributions. In this paper, we present Adaptive Support Vector Machine (Ada...
Jun Yang 0003, Rong Yan, Alexander G. Hauptmann
ICDT
2007
ACM
118views Database» more  ICDT 2007»
15 years 8 months ago
Approximate Data Exchange
Abstract. We introduce approximate data exchange, by relaxing classical data exchange problems such as Consistency and Typechecking to their approximate versions based on Property ...
Michel de Rougemont, Adrien Vieilleribière
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
« Prev « First page 2534 / 2783 Last » Next »