Sciweavers

DKE
2008
78views more  DKE 2008»
13 years 11 months ago
A conceptual view on trajectories
Stefano Spaccapietra, Christine Parent, Maria Luis...
DKE
2008
172views more  DKE 2008»
13 years 11 months ago
An XML Schema integration and query mechanism system
The availability of large amounts of heterogeneous distributed web data necessitates the integration of XML data from multiple XML sources for many reasons. For example, currently,...
Sanjay Kumar Madria, Kalpdrum Passi, Sourav S. Bho...
DKE
2008
91views more  DKE 2008»
13 years 11 months ago
SUSAX: Context-specific searching in XML documents using sequence alignment techniques
Keyword searching while very successful in narrowing down the contents of the Web to the pertaining subset of information, has two primary drawbacks. First, the accuracy of the se...
Kajal T. Claypool
DKE
2008
57views more  DKE 2008»
13 years 11 months ago
On the evaluation of the decision performance of an incomplete decision table
As two classical measures, approximation accuracy and consistency degree can be extended for evaluating the decision performance of an incomplete decision table. However, when the...
Yuhua Qian, Chuangyin Dang, Jiye Liang, Haiyun Zha...
DKE
2008
124views more  DKE 2008»
13 years 11 months ago
A MaxMin approach for hiding frequent itemsets
In this paper, we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) rel...
George V. Moustakides, Vassilios S. Verykios
DKE
2008
106views more  DKE 2008»
13 years 11 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li
DKE
2008
98views more  DKE 2008»
13 years 11 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
DKE
2008
83views more  DKE 2008»
13 years 11 months ago
Mining fuzzy periodic association rules
We develop techniques for discovering patterns with periodicity in this work. Patterns with periodicity are those that occur at regular time intervals, and therefore there are two...
Wan-Jui Lee, Jung-Yi Jiang, Shie-Jue Lee
DKE
2008
64views more  DKE 2008»
13 years 11 months ago
Recent advances in preserving privacy when mining data
Francesco Bonchi, Bradley Malin, Yücel Saygin
DKE
2008
96views more  DKE 2008»
13 years 11 months ago
Fragment-based approximate retrieval in highly heterogeneous XML collections
Due to the heterogeneous nature of XML data for internet applications exact matching of queries is often inadequate. The need arises to quickly identify subtrees of XML documents ...
Ismael Sanz, Marco Mesiti, Giovanna Guerrini, Rafa...