J Vaidya, C Clifton - Proceedings of the eighth ACM SIGKDD …, 2002 - dl.acm.org
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each …
Privacy preserving mining of distributed data has numerous applications. Each application poses different constraints: What is meant by privacy, what are the desired results, how is the …
J Vaidya, C Clifton - Journal of Computer Security, 2005 - content.iospress.com
There has been concern over the apparent conflict between privacy and data mining. There is no inherent conflict, as most types of data mining produce summary results that do not …
BH Park, H Kargupta - The handbook of data mining, 2003 - books.google.com
Advances in computing and communication over wired and wireless networks have resulted in many pervasive distributed computing environments. The Internet, intranets, local area …
W Wu, L Gruenwald - Proceedings of the First International Workshop on …, 2010 - dl.acm.org
There exist emerging applications of data streams that have mining requirements. Although single data stream mining has been extensively studied, little research has been done for …
We present a collective approach to learning a Bayesian network from distributed heterogeneous data. In this approach, we first learn a local Bayesian network at each site …
Over the past two decades, business volume of hardware and software in the US has decreased by about seventy percent, while the cost of management and support has grown …
TH Dillon - US Patent 7,676,400, 2010 - Google Patents
(57) ABSTRACT A data processing system generates recommendations for on-line shopping by scoring recommendations matching the customer's cart contents using by …
The goal of data mining is to extract or “mine” knowledge from large amounts of data. However, data is often collected by several different sites. Privacy, legal and commercial …