Sciweavers

87 search results - page 4 / 18
» Anonymized Data: Generation, models, usage
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
KDD
2008
ACM
217views Data Mining» more  KDD 2008»
14 years 8 months ago
Stream prediction using a generative model based on frequent episodes in event sequences
This paper presents a new algorithm for sequence prediction over long categorical event streams. The input to the algorithm is a set of target event types whose occurrences we wis...
Srivatsan Laxman, Vikram Tankasali, Ryen W. White
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 5 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 8 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
VLDB
2005
ACM
81views Database» more  VLDB 2005»
14 years 1 months ago
Flexible Database Generators
Evaluation and applicability of many database techniques, ranging from access methods, histograms, and optimization strategies to data normalization and mining, crucially depend o...
Nicolas Bruno, Surajit Chaudhuri