Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Using sample size to limit exposure to data mining
Journal of Computer Security - Special issue on database security
Distributed data clustering can be efficient and exact
ACM SIGKDD Explorations Newsletter - Special issue on “Scalable data mining algorithms”
Models and issues in data stream systems
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Emergence of agent-based referral networks
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
Distributed clustering using collective principal component analysis
Knowledge and Information Systems
Advances in Distributed and Parallel Knowledge Discovery
Advances in Distributed and Parallel Knowledge Discovery
RACHET: An Efficient Cover-Based Merging of Clustering Hierarchies from Distributed Datasets
Distributed and Parallel Databases - Special issue: Parallel and distributed data mining
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Parallel and Distributed Association Mining: A Survey
IEEE Concurrency
Hiding Association Rules by Using Confidence and Support
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Data mining, national security, privacy and civil liberties
ACM SIGKDD Explorations Newsletter
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Cryptographic techniques for privacy-preserving data mining
ACM SIGKDD Explorations Newsletter
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Disclosure Limitation of Sensitive Rules
KDEX '99 Proceedings of the 1999 Workshop on Knowledge and Data Engineering Exchange
Data Clustering Using Evidence Accumulation
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 4 - Volume 4
Building decision tree classifier on private data
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
A methodology for hiding knowledge in databases
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy Preserving Association Rule Mining
RIDE '02 Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02)
Cluster ensembles --- a knowledge reuse framework for combining multiple partitions
The Journal of Machine Learning Research
Combining Multiple Weak Clusterings
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving Distributed Clustering using Generative Models
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Distributed clustering based on sampling local density estimates
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Reflective negotiating agents for real-time multisensor target tracking
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 2
Agent-based distributed data mining: the KDEC scheme
Intelligent information agents
An Evolutionary Ensemble-Based Method for Rule Extraction with Distributed Data
HAIS '09 Proceedings of the 4th International Conference on Hybrid Artificial Intelligence Systems
Development of the Data Preprocessing Agent's Knowledge for Data Mining Using Rough Set Theory
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Multiagent Framework for Bio-data Mining
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Prototype selection algorithms for distributed learning
Pattern Recognition
A knowledge-based architecture for distributed fault analysis in power networks
Engineering Applications of Artificial Intelligence
A new approach for distributed density based clustering on grid platform
BNCOD'07 Proceedings of the 24th British national conference on Databases
Content-based medical image retrieval in peer-to-peer systems
Proceedings of the 1st ACM International Health Informatics Symposium
An agent-based framework for distributed learning
Engineering Applications of Artificial Intelligence
Cluster integration for the cluster-based instance selection
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Distributed data mining for e-business
Information Technology and Management
Distributed learning with data reduction
Transactions on computational collective intelligence IV
A new cluster-based instance selection algorithm
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part II
International Journal of Autonomous and Adaptive Communications Systems
Homogeneous and heterogeneous distributed classification for pocket data mining
Transactions on Large-Scale Data- and Knowledge-Centered Systems V
A multi-agent based approach to clustering: harnessing the power of agents
ADMI'11 Proceedings of the 7th international conference on Agents and Data Mining Interaction
A multi-agent data mining system for cartel detection in Brazilian government procurement
Expert Systems with Applications: An International Journal
Actionable knowledge discovery and delivery
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery
A framework for Multi-Agent Based Clustering
Autonomous Agents and Multi-Agent Systems
International Journal of Metadata, Semantics and Ontologies
International Journal of Metadata, Semantics and Ontologies
Hi-index | 0.00 |
Multi-agent systems (MAS) offer an architecture for distributed problem solving. Distributed data mining (DDM) algorithms focus on one class of such distributed problem solving tasks-analysis and modeling of distributed data. This paper offers a perspective on DDM algorithms in the context of multi-agents systems. It discusses broadly the connection between DDM and MAS. It provides a high-level survey of DDM, then focuses on distributed clustering algorithms and some potential applications in multi-agent-based problem solving scenarios. It reviews algorithms for distributed clustering, including privacy-preserving ones. It describes challenges for clustering in sensor-network environments, potential shortcomings of the current algorithms, and future work accordingly. It also discusses confidentiality (privacy preservation) and presents a new algorithm for privacy-preserving density-based clustering.