-
1
-
-
0001882616
-
Fast algorithms for mining association rules in large databases
-
Morgan Kaufmann, San Francisco, CA
-
Agrawal, R., R. Srikant. 1994. Fast algorithms for mining association rules in large databases. Proc. 20th Internat. Conf. Very Large Databases, Morgan Kaufmann, San Francisco, CA, 487-499.
-
(1994)
Proc. 20th Internat. Conf. Very Large Databases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
IEEE Computer Society, Washington, D.C
-
Atallah, M., E. Bertino, A. Elmagarmid, M. Ibrahim, V. Verykios. 1999. Disclosure limitation of sensitive rules. Proc. 1999 Workshop Knowkdge Data Engrg. Exchange, 1999 (KDEX '99), IEEE Computer Society, Washington, D.C., 45-52.
-
(1999)
Proc. 1999 Workshop Knowkdge Data Engrg. Exchange, 1999 (KDEX '99)
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.5
-
3
-
-
28244432179
-
Integer programming software systems
-
Atamtürk, A., M. Savelsbergh. 2005. Integer programming software systems. Ann. Oper. Res. 140 67-124.
-
(2005)
Ann. Oper. Res
, vol.140
, pp. 67-124
-
-
Atamtürk, A.1
Savelsbergh, M.2
-
4
-
-
0004210215
-
-
Addison-Wesley, Reading, MA
-
Bradley, S., A. Max, T. Magnanti. 1977. Applied Mathematical Programming. Addison-Wesley, Reading, MA.
-
(1977)
Applied Mathematical Programming
-
-
Bradley, S.1
Max, A.2
Magnanti, T.3
-
5
-
-
0013110524
-
The use of association rules for product assortment decisions: A case study
-
ACM Press, New York
-
Brijs, T., G. Swinnen, K. Vanhoof, G. Wets. 1999. The use of association rules for product assortment decisions: A case study. Proc. Fifth ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining, ACM Press, New York, 254-260.
-
(1999)
Proc. Fifth ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining
, pp. 254-260
-
-
Brijs, T.1
Swinnen, G.2
Vanhoof, K.3
Wets, G.4
-
6
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
Choudhury, S., G. Duncan, R. Krishnan, S. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45(12) 1710-1723.
-
(1999)
Management Sci
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Choudhury, S.1
Duncan, G.2
Krishnan, R.3
Roehrig, S.4
Mukherjee, S.5
-
7
-
-
0037664299
-
Using conjunction of attribute values for classification
-
ACM Press, New York
-
Deshpande, M., G. Karypis. 2002. Using conjunction of attribute values for classification. CIKM '02: Proc. Eleventh Internat. Conf. Inform. Knowledge Management, McLean, VA. ACM Press, New York, 356-364.
-
(2002)
CIKM '02: Proc. Eleventh Internat. Conf. Inform. Knowledge Management, McLean, VA
, pp. 356-364
-
-
Deshpande, M.1
Karypis, G.2
-
8
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan, G., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
-
(2000)
J. Amer. Statist. Assoc
, vol.95
, Issue.451
, pp. 720-729
-
-
Duncan, G.1
Mukherjee, S.2
-
9
-
-
4444235806
-
A local branching heuristic for mixed-integer programs with 2-level variables, with an application to a telecommunication network design problem
-
Fischetti, M., C. Polo, M. Scantamburlo. 2004. A local branching heuristic for mixed-integer programs with 2-level variables, with an application to a telecommunication network design problem. Networks 44(2) 61-72.
-
(2004)
Networks
, vol.44
, Issue.2
, pp. 61-72
-
-
Fischetti, M.1
Polo, C.2
Scantamburlo, M.3
-
10
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
-
(2002)
Management Sci
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
11
-
-
2442465323
-
-
Ph.D. thesis, Universiteit Limburg, Diepenbeek, Belgium
-
Goethals, B. 2002. Efficient frequent pattern mining. Ph.D. thesis, Universiteit Limburg, Diepenbeek, Belgium.
-
(2002)
Efficient frequent pattern mining
-
-
Goethals, B.1
-
12
-
-
33644996549
-
-
Center for IT and e-Business Management, University of Illinois at Urbana-Champaign, Champaign, IL
-
Grean, M., M. Shaw. 2005. Supply-chain integration through information sharing: Channel partnership between Wal-Mart and Procter & Gamble. IT Management Case, Center for IT and e-Business Management, University of Illinois at Urbana-Champaign, Champaign, IL.
-
(2005)
Supply-chain integration through information sharing: Channel partnership between Wal-Mart and Procter & Gamble. IT Management Case
-
-
Grean, M.1
Shaw, M.2
-
14
-
-
33847019833
-
When to share: Wal-Mart and other companies reassess their data-sharing strategies
-
Heun, C. 2001. When to share: Wal-Mart and other companies reassess their data-sharing strategies. InformationWeek.com. http://www. informationweek.com/838/data.htm.
-
(2001)
InformationWeek.com
-
-
Heun, C.1
-
15
-
-
33847011611
-
-
ILOG. 2003. ILOG CPLEX 9.0 User's Manual. ILOG Inc., Gentilly, France.
-
ILOG. 2003. ILOG CPLEX 9.0 User's Manual. ILOG Inc., Gentilly, France.
-
-
-
-
16
-
-
78149313084
-
CMAR: Accurate and efficient classification based on multiple class-association rules
-
IEEE Computer Society, Washington, D.C
-
Li, W., J. Man, J. Pei. 2001. CMAR: Accurate and efficient classification based on multiple class-association rules. ICDM '01: Proc. First IEEE Internat. Conf. Data Mining (ICDM '01), IEEE Computer Society, Washington, D.C., 369-376.
-
(2001)
ICDM '01: Proc. First IEEE Internat. Conf. Data Mining (ICDM '01)
, pp. 369-376
-
-
Li, W.1
Man, J.2
Pei, J.3
-
17
-
-
33847010448
-
Collaborative business: Companies that dare to share information are cashing in on new opportunities
-
McDougall, P. 2001. Collaborative business: Companies that dare to share information are cashing in on new opportunities. InformationWeek.com. http://informationweek.com/836/collaborate.htm.
-
(2001)
InformationWeek.com
-
-
McDougall, P.1
-
18
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
Menon, S., S. Sarkar, S. Mukherjee. 2005. Maximizing accuracy of shared databases when concealing sensitive patterns. Inform. Systems Res. 16(3) 256-270.
-
(2005)
Inform. Systems Res
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
19
-
-
11844280758
-
Privacy preserving frequent itemset mining
-
Australian Computer Society, Sydney, Australia
-
Oliveira, S., O. Zaïane. 2002. Privacy preserving frequent itemset mining. Proc. IEEE ICDM Workshop Privacy, Security Data Mining, Australian Computer Society, Sydney, Australia, 43-54.
-
(2002)
Proc. IEEE ICDM Workshop Privacy, Security Data Mining
, pp. 43-54
-
-
Oliveira, S.1
Zaïane, O.2
-
20
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
-
(2002)
Inform. Systems Res
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
21
-
-
2142754478
-
Association rule hiding
-
Verykios, V., A. Elmagarmid, E. Bertino, Y. Saygin, E. Dasseni. 2004. Association rule hiding. IEEE Trans. Knowledge Data Engrg. 16(4) 434-147.
-
(2004)
IEEE Trans. Knowledge Data Engrg
, vol.16
, Issue.4
, pp. 434-147
-
-
Verykios, V.1
Elmagarmid, A.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
22
-
-
33847018674
-
GHIC: A hierarchical pattern-based clustering algorithm for grouping web transactions
-
Yang, Y., B. Padmanabhan. 2005. GHIC: A hierarchical pattern-based clustering algorithm for grouping web transactions. IEEE Trans. Knowledge Data Engrg. 17(9) 1300-1304.
-
(2005)
IEEE Trans. Knowledge Data Engrg
, vol.17
, Issue.9
, pp. 1300-1304
-
-
Yang, Y.1
Padmanabhan, B.2
|