Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Central Florida

Electronic Theses and Dissertations

Data Mining

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

An Architecture For High-Performance Privacy-Preserving And Distributed Data Mining, James Secretan Jan 2009

An Architecture For High-Performance Privacy-Preserving And Distributed Data Mining, James Secretan

Electronic Theses and Dissertations

This dissertation discusses the development of an architecture and associated techniques to support Privacy Preserving and Distributed Data Mining. The field of Distributed Data Mining (DDM) attempts to solve the challenges inherent in coordinating data mining tasks with databases that are geographically distributed, through the application of parallel algorithms and grid computing concepts. The closely related field of Privacy Preserving Data Mining (PPDM) adds the dimension of privacy to the problem, trying to find ways that organizations can collaborate to mine their databases collectively, while at the same time preserving the privacy of their records. Developing data mining algorithms for …


Scalable And Efficient Outlier Detection In Large Distributed Data Sets With Mixed-Type Attributes, Anna Koufakou Jan 2009

Scalable And Efficient Outlier Detection In Large Distributed Data Sets With Mixed-Type Attributes, Anna Koufakou

Electronic Theses and Dissertations

An important problem that appears often when analyzing data involves identifying irregular or abnormal data points called outliers. This problem broadly arises under two scenarios: when outliers are to be removed from the data before analysis, and when useful information or knowledge can be extracted by the outliers themselves. Outlier Detection in the context of the second scenario is a research field that has attracted significant attention in a broad range of useful applications. For example, in credit card transaction data, outliers might indicate potential fraud; in network traffic data, outliers might represent potential intrusion attempts. The basis of deciding …