Sciweavers

SIGKDD
2002
94views more  SIGKDD 2002»
13 years 11 months ago
BIOKDD01: Workshop on Data Mining in Bioinformatics
Mohammed Javeed Zaki, Jason Tsong-Li Wang, Hannu T...
SIGKDD
2002
162views more  SIGKDD 2002»
13 years 11 months ago
Background and Overview for KDD Cup 2002 Task 1: Information Extraction from Biomedical Articles
This paper presents a background and overview for task 1 (of 2 tasks) of the KDD Challenge Cup 2002, a competition held in conjunction with the ACM SIGKDD International Conference...
Alexander S. Yeh, Lynette Hirschman, Alexander A. ...
SIGKDD
2002
78views more  SIGKDD 2002»
13 years 11 months ago
Predicting the Effects of Gene Deletion
In this paper, we describe techniques that can be used to predict the effects of gene deletion. We will focus mainly on the creation of predictive variables, and then briefly disc...
David S. Vogel, Randy C. Axelrod
SIGKDD
2002
172views more  SIGKDD 2002»
13 years 11 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
SIGKDD
2002
93views more  SIGKDD 2002»
13 years 11 months ago
A Perspective on Inductive Databases
Inductive databases tightly integrate databases with data mining. The key ideas are that data and patterns (or models) are handled in the same way and that an inductive query lang...
Luc De Raedt
SIGKDD
2002
117views more  SIGKDD 2002»
13 years 11 months ago
Classification trees for problems with monotonicity constraints
Rob Potharst, A. J. Feelders
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 11 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
SIGKDD
2002
73views more  SIGKDD 2002»
13 years 11 months ago
Discovery in multi-attribute data with user-defined constraints
Chang-Shing Perng, Haixun Wang, Sheng Ma, Joseph L...
SIGKDD
2002
81views more  SIGKDD 2002»
13 years 11 months ago
P-tree Classification of Yeast Gene Deletion Data
Genomics data has many properties that make it different from "typical" relational data. The presence of multi-valued attributes as well as the large number of null valu...
Amal Perera, Anne Denton, Pratap Kotala, William J...
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 11 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier