Academic literature on the topic 'Transactional datasets'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transactional datasets.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transactional datasets"
AL Bouna, Bechara, Chris Clifton, and Qutaibah Malluhi. "Anonymizing transactional datasets." Journal of Computer Security 23, no. 1 (March 15, 2015): 89–106. http://dx.doi.org/10.3233/jcs-140517.
Full textPuri, Vartika, Parmeet Kaur, and Shelly Sachdeva. "ADT." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 83–105. http://dx.doi.org/10.4018/ijisp.2021070106.
Full textVu, Duc Thi, and Huy Duc Nguyen. "Mining High Utility Itemsets in Massive Transactional Datasets." Acta Cybernetica 20, no. 2 (2011): 331–46. http://dx.doi.org/10.14232/actacyb.20.2.2011.6.
Full textLiu, Xiangwen, Xia Feng, and Yuquan Zhu. "Transactional Data Anonymization for Privacy and Information Preservation via Disassociation and Local Suppression." Symmetry 14, no. 3 (February 25, 2022): 472. http://dx.doi.org/10.3390/sym14030472.
Full textTang, Huijun, Le Wang, Yangguang Liu, and Jiangbo Qian. "Discovering Approximate and Significant High-Utility Patterns from Transactional Datasets." Journal of Mathematics 2022 (November 16, 2022): 1–17. http://dx.doi.org/10.1155/2022/6975130.
Full textPuri, Vartika, Parmeet Kaur, and Shelly Sachdeva. "Effective Removal of Privacy Breaches in Disassociated Transactional Datasets." Arabian Journal for Science and Engineering 45, no. 4 (January 28, 2020): 3257–72. http://dx.doi.org/10.1007/s13369-020-04353-5.
Full textAl-Bana, Mohamed Reda, Marwa Salah Farhan, and Nermin Abdelhakim Othman. "An Efficient Spark-Based Hybrid Frequent Itemset Mining Algorithm for Big Data." Data 7, no. 1 (January 14, 2022): 11. http://dx.doi.org/10.3390/data7010011.
Full textR., Sujatha, and Dr S. Ravichandran. "MAX-MiBit-An Algorithm To Discover Maximal Frequent Itemsets From Large Transactional Datasets." International Journal of Research in Advent Technology 7, no. 4 (April 10, 2019): 326–29. http://dx.doi.org/10.32622/ijrat.742019122.
Full textYan, Hua, Keke Chen, Ling Liu, and Joonsoo Bae. "Determining the best K for clustering transactional datasets: A coverage density-based approach." Data & Knowledge Engineering 68, no. 1 (January 2009): 28–48. http://dx.doi.org/10.1016/j.datak.2008.08.005.
Full textKahanda, Indika, and Jennifer Neville. "Using Transactional Information to Predict Link Strength in Online Social Networks." Proceedings of the International AAAI Conference on Web and Social Media 3, no. 1 (March 19, 2009): 74–81. http://dx.doi.org/10.1609/icwsm.v3i1.13957.
Full textDissertations / Theses on the topic "Transactional datasets"
Sakaguchi, Hiroaki. "Psychology of financial decisions, using large transaction datasets." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/97208/.
Full textAlchicha, Élie. "Confidentialité Différentielle et Blowfish appliquées sur des bases de données graphiques, transactionnelles et images." Thesis, Pau, 2021. http://www.theses.fr/2021PAUU3067.
Full textDigital data is playing crucial role in our daily life in communicating, saving information, expressing our thoughts and opinions and capturing our precious moments as digital pictures and videos. Digital data has enormous benefits in all the aspects of modern life but forms also a threat to our privacy. In this thesis, we consider three types of online digital data generated by users of social media and e-commerce customers: graphs, transactional, and images. The graphs are records of the interactions between users that help the companies understand who are the influential users in their surroundings. The photos posted on social networks are an important source of data that need efforts to extract. The transactional datasets represent the operations that occurred on e-commerce services.We rely on a privacy-preserving technique called Differential Privacy (DP) and its generalization Blowfish Privacy (BP) to propose several solutions for the data owners to benefit from their datasets without the risk of privacy breach that could lead to legal issues. These techniques are based on the idea of recovering the existence or non-existence of any element in the dataset (tuple, row, edge, node, image, vector, ...) by adding respectively small noise on the output to provide a good balance between privacy and utility.In the first use case, we focus on the graphs by proposing three different mechanisms to protect the users' personal data before analyzing the datasets. For the first mechanism, we present a scenario to protect the connections between users (the edges in the graph) with a new approach where the users have different privileges: the VIP users need a higher level of privacy than standard users. The scenario for the second mechanism is centered on protecting a group of people (subgraphs) instead of nodes or edges in a more advanced type of graphs called dynamic graphs where the nodes and the edges might change in each time interval. In the third scenario, we keep focusing on dynamic graphs, but this time the adversaries are more aggressive than the past two scenarios as they are planting fake accounts in the dynamic graphs to connect to honest users and try to reveal their representative nodes in the graph. In the second use case, we contribute in the domain of transactional data by presenting an existed mechanism called Safe Grouping. It relies on grouping the tuples in such a way that hides the correlations between them that the adversary could use to breach the privacy of the users. On the other side, these correlations are important for the data owners in analyzing the data to understand who might be interested in similar products, goods or services. For this reason, we propose a new mechanism that exposes these correlations in such datasets, and we prove that the level of privacy is similar to the level provided by Safe Grouping.The third use-case concerns the images posted by users on social networks. We propose a privacy-preserving mechanism that allows the data owners to classify the elements in the photos without revealing sensitive information. We present a scenario of extracting the sentiments on the faces with forbidding the adversaries from recognizing the identity of the persons. For each use-case, we present the results of the experiments that prove that our algorithms can provide a good balance between privacy and utility and that they outperform existing solutions at least in one of these two concepts
Kim, GwanSeon. "UTILIZING LARGE SCALE DATASETS TO EVALUATE ASPECTS OF A SUSTAINABLE BIOECONOMY." UKnowledge, 2019. https://uknowledge.uky.edu/agecon_etds/78.
Full textBook chapters on the topic "Transactional datasets"
Raj, Shashi, and Dharavath Ramesh. "Applying Partition Method to Adopt Spark-Based Eclat Algorithm for Large Transactional Datasets." In Algorithms for Intelligent Systems, 131–44. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3951-8_11.
Full textTaraba, Peter. "Clustering for Binary Featured Datasets." In Transactions on Engineering Technologies, 127–42. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2191-7_10.
Full textAl Bouna, Bechara, Chris Clifton, and Qutaibah Malluhi. "Using Safety Constraint for Transactional Dataset Anonymization." In Lecture Notes in Computer Science, 164–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39256-6_11.
Full textCabiddu, Daniela, and Marco Attene. "Processing Large Geometric Datasets in Distributed Environments." In Transactions on Computational Science XXIX, 97–120. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-54563-8_6.
Full textMemon, Neelam, and Jianhua Shao. "MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce." In Data and Applications Security and Privacy XXIX, 3–18. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20810-7_1.
Full textYoshimura, Yuji, Alexander Amini, Stanislav Sobolevsky, Josep Blat, and Carlo Ratti. "Analysis of Customers’ Spatial Distribution Through Transaction Datasets." In Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII, 177–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53416-8_11.
Full textPatra, Bidyut Kr, and Sukumar Nandi. "Tolerance Rough Set Theory Based Data Summarization for Clustering Large Datasets." In Transactions on Rough Sets XIV, 139–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21563-6_8.
Full textPhan, Trong Nhan, Josef Küng, and Tran Khanh Dang. "An Adaptive Similarity Search in Massive Datasets." In Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII, 45–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49175-1_3.
Full textPoulis, Giorgos, Aris Gkoulalas-Divanis, Grigorios Loukides, Spiros Skiadopoulos, and Christos Tryfonopoulos. "SECRETA: A Tool for Anonymizing Relational, Transaction and RT-Datasets." In Medical Data Privacy Handbook, 83–109. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9_5.
Full textAl-E’mari, Salam, Mohammed Anbar, Yousef Sanjalawe, and Selvakumar Manickam. "A Labeled Transactions-Based Dataset on the Ethereum Network." In Communications in Computer and Information Science, 61–79. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6835-4_5.
Full textConference papers on the topic "Transactional datasets"
Babu, M. Vinaya, and M. Sreedevi. "A Comprehensive Study on Enhanced Clustering Technique of Association Rules over Transactional Datasets." In 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2021. http://dx.doi.org/10.1109/i-smac52330.2021.9640681.
Full textZheng, Wenbo, Lan Yan, Chao Gou, and Fei-Yue Wang. "Federated Meta-Learning for Fraudulent Credit Card Detection." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/642.
Full textCardoso, Fabian Corrêa, Juan Malska, Paulo Ramiro, Giancarlo Lucca, Eduardo N. Borges, Viviane de Mattos, and Rafael Berri. "BovDB: A data set of stock quotes for Machine Learning on all companies from B3 between 1995 and 2020." In Dataset Showcase Workshop. Sociedade Brasileira de Computação, 2021. http://dx.doi.org/10.5753/dsw.2021.17411.
Full textWANG, Cheng. "The Behavioral Sign of Account Theft: Realizing Online Payment Fraud Alert." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/636.
Full textHuy, Thach Nguyen, Sombut Foitong, Sornchai Udomthanapong, Ouen Pinngern, Sio-Iong Ao, Alan Hoi-Shou Chan, Hideki Katagiri, Osca Castillo, and Li Xu. "Effects of Distance between Classes and Training Dataset Size on Imbalance Datasets." In IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES VOLUME I: Special Edition of the International MultiConference of Engineers and Computer Scientists 2008. AIP, 2009. http://dx.doi.org/10.1063/1.3078140.
Full textCarswell, James D., Keith Gardiner, and Marco Neumann. "Wireless spatio-semantic transactions on multimedia datasets." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.968143.
Full textAlweshah, Mohammed, Wael Ahmad AlZoubi, and Abdulsalam Alarabeyyat. "Cluster based data reduction method for transaction datasets." In 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2015. http://dx.doi.org/10.1109/iscaie.2015.7298332.
Full textLin, Wangli, Li Sun, Qiwei Zhong, Can Liu, Jinghua Feng, Xiang Ao, and Hao Yang. "Online Credit Payment Fraud Detection via Structure-Aware Hierarchical Recurrent Neural Network." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/505.
Full textDoan, Thang, Neil Veira, and Brian Keng. "Generating Realistic Sequences of Customer-Level Transactions for Retail Datasets." In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 2018. http://dx.doi.org/10.1109/icdmw.2018.00122.
Full textMorency, Catherine, Martin Trepanier, Bruno Agard, Basile Martin, and Joel Quashie. "Car sharing system: what transaction datasets reveal on users' behaviors." In 2007 IEEE Intelligent Transportation Systems Conference. IEEE, 2007. http://dx.doi.org/10.1109/itsc.2007.4357656.
Full textReports on the topic "Transactional datasets"
Alviarez, Vanessa, Michele Fioretti, Ken Kikkawa, and Monica Morlacco. Two-Sided Market Power in Firm-to-Firm Trade. Inter-American Development Bank, August 2021. http://dx.doi.org/10.18235/0003493.
Full text