You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Mobile communications and ubiquitous computing generate large volumes of data. Mining this data can produce useful knowledge, yet individual privacy is at risk. This book investigates the various scientific and technological issues of mobility data, open problems, and roadmap. The editors manage a research project called GeoPKDD, Geographic Privacy-Aware Knowledge Discovery and Delivery, and this book relates their findings in 13 chapters covering all related subjects.
The proceedings of ECML/PKDD 2004 are published in two separate, albeit - tertwined,volumes:theProceedingsofthe 15thEuropeanConferenceonMac- ne Learning (LNAI 3201) and the Proceedings of the 8th European Conferences on Principles and Practice of Knowledge Discovery in Databases (LNAI 3202). The two conferences were co-located in Pisa, Tuscany, Italy during September 20–24, 2004. It was the fourth time in a row that ECML and PKDD were co-located. - ter the successful co-locations in Freiburg (2001), Helsinki (2002), and Cavtat- Dubrovnik (2003), it became clear that researchersstrongly supported the or- nization of a major scienti?c event about machine learning and data mining in Europe. W...
Artificial intelligence has become an integral part of all our lives. Development is rapid in this exciting and far-reaching field, and keeping up to date with the latest research and innovation is crucial to all those working with the technology. This book presents the proceedings of the 24th edition of CCIA, the International Conference of the Catalan Association for Artificial Intelligence, held in Sitges, Spain, from 19 – 21 October 2022. This annual event serves as a meeting point not only for researchers in AI from the Catalan speaking territories (southern France, Catalonia, Valencia, the Balearic Islands and Alghero in Italy) but for researchers from around the world. The programme...
Introduction The dramatic increase in available computer storage capacity over the last 10 years has led to the creation of very large databases of scienti?c and commercial information. The need to analyze these masses of data has led to the evolution of the new ?eld knowledge discovery in databases (KDD) at the intersection of machine learning, statistics and database technology. Being interdisciplinary by nature, the ?eld o?ers the opportunity to combine the expertise of di?erent ?elds intoacommonobjective.Moreover,withineach?elddiversemethodshave been developed and justi?ed with respect to di?erent quality criteria. We have toinvestigatehowthesemethods cancontributeto solvingthe problemof...
This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.
The use of logic in databases started in the late 1960s. In the early 1970s Codd formalized databases in terms of the relational calculus and the relational algebra. A major influence on the use of logic in databases was the development of the field of logic programming. Logic provides a convenient formalism for studying classical database problems and has the important property of being declarative, that is, it allows one to express what she wants rather than how to get it. For a long time, relational calculus and algebra were considered the relational database languages. However, there are simple operations, such as computing the transitive closure of a graph, which cannot be expressed wit...
This book is about inductive databases and constraint-based data mining, emerging research topics lying at the intersection of data mining and database research. The aim of the book as to provide an overview of the state-of- the art in this novel and - citing research area. Of special interest are the recent methods for constraint-based mining of global models for prediction and clustering, the uni?cation of pattern mining approaches through constraint programming, the clari?cation of the re- tionship between mining local patterns and global models, and the proposed in- grative frameworks and approaches for inducive databases. On the application side, applications to practically relevant pro...
This two-volume set constitutes the refereed proceedings of the workshops which complemented the 21th Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD, held in September 2021. Due to the COVID-19 pandemic the conference and workshops were held online. The 104 papers were thoroughly reviewed and selected from 180 papers submited for the workshops. This two-volume set includes the proceedings of the following workshops:Workshop on Advances in Interpretable Machine Learning and Artificial Intelligence (AIMLAI 2021)Workshop on Parallel, Distributed and Federated Learning (PDFL 2021)Workshop on Graph Embedding and Mining (GEM 2021)Workshop on Machine L...
This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks. It collects the works presented at the 9th International Conference on Complex Networks (CompleNet) in Boston, MA, March, 2018. With roots in physical, information and social science, the study of complex networks provides a formal set of mathematical methods, computational tools and theories to describe, prescribe and predict dynamics and behaviors of complex systems. Despite their diversity, whether the systems are made up of physical, technological, informational, or social networks, they share many common organizing principles and thus can be studied with similar approaches. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as group decision-making, brain and cellular connectivity, network controllability and resiliency, online activism, recommendation systems, and cyber security.