Data Mining: The Next Generation
暂无分享,去创建一个
Hans-Peter Kriegel | Jaideep Srivastava | Daniel A. Keim | Heikki Mannila | Bing Liu | Prabhakar Raghavan | Rosa Meo | Jian Pei | Raymond T. Ng | Rakesh Agrawal | Ulf Leser | Stefan Kramer | Myra Spiliopoulou | Jochen Hipp | Johann-Christoph Freytag | Raghu Ramakrishnan | Saso Dzeroski | Shinichi Morishita | Chris Clifton | Toni Bollinger | Vicenc Torra
[1] Ivan P. Fellegi,et al. On the Question of Statistical Confidentiality , 1972 .
[2] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[3] Ulf Leser,et al. Systematic feature evaluation for gene name recognition , 2005, BMC Bioinformatics.
[4] Jeremy Buhler,et al. Designing seeds for similarity search in genomic DNA , 2005, J. Comput. Syst. Sci..
[5] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[6] Ron Shamir,et al. Scoring clustering solutions by their biological relevance , 2003, Bioinform..
[7] Joel D. Martin,et al. PreBIND and Textomy – mining the biomedical literature for protein-protein interactions using a support vector machine , 2003, BMC Bioinformatics.
[8] Shinichi Morishita,et al. Constrained clusters of gene expression profiles with pathological features , 2004, Bioinform..
[9] S. Fienberg,et al. Bounding Entries in Multi-way Contingency Tables Given a Set of Marginal Totals , 2003 .
[10] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[11] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[12] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[13] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[14] I. Jonassen,et al. Predicting gene regulatory elements in silico on a genomic scale. , 1998, Genome research.
[15] W. J. Kent,et al. BLAT--the BLAST-like alignment tool. , 2002, Genome research.
[16] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[17] Stephen E. Fienberg,et al. Bounds for Cell Entries in Two-Way Tables Given Conditional Relative Frequencies , 2004, Privacy in Statistical Databases.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] C. Papadimitriou,et al. On the value of private information , 2001 .
[20] T. Jenssen,et al. A literature network of human genes for high-throughput analysis of gene expression , 2001 .
[21] Luc De Raedt,et al. Data Mining and Machine Learning Techniques for the Identification of Mutagenicity Inducing Substructures and Structure Activity Relationships of Noncongeneric Compounds , 2004, J. Chem. Inf. Model..
[22] J. Blake,et al. Creating the Gene Ontology Resource : Design and Implementation The Gene Ontology Consortium 2 , 2001 .
[23] Toshihisa Takagi,et al. Kinase pathway database: an integrated protein-kinase and NLP-based protein-interaction resource. , 2003, Genome research.
[24] Adrian Dobra,et al. Assessing the Risk of Disclosure of Confidential Categorical Data , 2002 .
[25] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[26] George T. Duncan,et al. Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .