Sciweavers

337 search results - page 55 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 9 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
PAKDD
2009
ACM
225views Data Mining» more  PAKDD 2009»
14 years 1 months ago
Accurate Synthetic Generation of Realistic Personal Information
A large proportion of the massive amounts of data that are being collected by many organisations today is about people, and often contains identifying information like names, addre...
Peter Christen, Agus Pudjijono
KDD
2008
ACM
165views Data Mining» more  KDD 2008»
14 years 9 months ago
Colibri: fast mining of large static and dynamic graphs
Low-rank approximations of the adjacency matrix of a graph are essential in finding patterns (such as communities) and detecting anomalies. Additionally, it is desirable to track ...
Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, P...
TKDE
2011
183views more  TKDE 2011»
13 years 3 months ago
Mining Discriminative Patterns for Classifying Trajectories on Road Networks
—Classification has been used for modeling many kinds of data sets, including sets of items, text documents, graphs, and networks. However, there is a lack of study on a new kind...
Jae-Gil Lee, Jiawei Han, Xiaolei Li, Hong Cheng
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 6 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan