Sciweavers

337 search results - page 37 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
KDD
2005
ACM
122views Data Mining» more  KDD 2005»
14 years 9 months ago
Pattern lattice traversal by selective jumps
Regardless of the frequent patterns to discover, either the full frequent patterns or the condensed ones, either closed or maximal, the strategy always includes the traversal of t...
Osmar R. Zaïane, Mohammad El-Hajj
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 6 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
ICDT
2007
ACM
148views Database» more  ICDT 2007»
14 years 3 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
ESORICS
2009
Springer
14 years 3 months ago
Privacy in Georeferenced Context-Aware Services: A Survey
Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The pr...
Daniele Riboni, Linda Pareschi, Claudio Bettini
PDP
2008
IEEE
14 years 3 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter