期刊文献+

“棱镜”事件与互联网挖掘

"Lens" Event and Web Mining
原文传递
导出
摘要 针对互联网的数据挖掘在"棱镜"计划中扮演着至关重要的角色。文中首先对数据挖掘的基本技术原理进行了分析,包括关联分析和机器学习的常用算法。然后介绍了互联网信息检索和挖掘的主要技术。接下来提出了一种基于开源云计算平台的互联网大数据挖掘系统架构。最后,对互联网大数据挖掘的发展指出了方向。 For the data mining for Web plays a key role in" Lens" project, this paper first analyzes the basic technical principles of data mining, including the general algorithms of association analysis and machine learning, then describes the main techniques of information retrieval and mining for Web, proposes the architecture for Web big-data mining system based on open-source cloud computing platform,including an algorithm for computing resource scheduling in cloud, and finally, the direction of technology development for Web mining is pointed out.
作者 罗俊
出处 《信息安全与通信保密》 2013年第12期87-91,95,共6页 Information Security and Communications Privacy
关键词 数据挖掘 信息检索 云计算 data mining information retrieval cloud computing
  • 相关文献

参考文献6

二级参考文献24

  • 1罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护私有信息的布尔关联规则挖掘算法[J].电子学报,2005,33(5):900-903. 被引量:33
  • 2黄伟伟,柏文阳.聚类挖掘中隐私保护的几何数据转换方法[J].计算机应用研究,2006,23(6):180-181. 被引量:7
  • 3张国荣,印鉴.应用正交变换保护数据中的隐私信息[J].计算机应用研究,2006,23(10):95-97. 被引量:4
  • 4宋宝莉,覃征.分布式环境下关联规则的安全挖掘算法[J].计算机工程,2006,32(21):35-37. 被引量:6
  • 5[1]Du Wenliang,Zhan Zhijun.Using randomized response techniques for privacy-preserving data mining[C].The 9th ACM SIGKDD Int'1 Conf.Knowledge Discovery in Databases and Data Mining,Washington,D.C.,2003.
  • 6[2]Saygin Y,Verykios S V,Elmagarmid K A.Privacy preserving association rule mining[C].In Proceedings of the 12th International Workshop on Research Issues in Data Engineering(2002),151-158.
  • 7[3]Agrawal R,Srikant R.Privacy-preserving data mining[C].In Proceedings of the ACM SIGMOD Conference on Management of Data,2000:439-450.
  • 8[4]Mievski E A,Srikant R,Agrawal R.Privacy preserving mining of association rules[C].In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining,2002.
  • 9[5]Clifton C,Kantarcioglou M,Zhu Y M.Tools for privacy preserving distributed data mining[J].SIGKDD Explorations 4,2002,(2).
  • 10[6]Du Wenliang,Zhan Zhijun.Building decision tree classifier on private data[C].In Proceedings of the IEEE ICDM Workshop on Privacy.Security and Data Mining,2002.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部