Sciweavers

2355 search results - page 36 / 471
» Anonymizing Temporal Data
Sort
View
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
14 years 9 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
MEDINFO
2007
179views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Temporal Abstraction and Data Mining with Visualization of Laboratory Data
Abstraction and Data Mining with Visualization of Laboratory Data Katsuhiko Takabayashi a , Tu Bao Ho b , Hideto Yokoi c , Trong Dung Nguyen b , Saori Kawasaki b , Si Quang Le b , ...
Katsuhiko Takabayashi, Tu Bao Ho, Hideto Yokoi, Tr...
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
13 years 9 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller
DMSN
2010
ACM
13 years 6 months ago
Facilitating fine grained data provenance using temporal data model
E-science applications use fine grained data provenance to maintain the reproducibility of scientific results, i.e., for each processed data tuple, the source data used to proce...
Mohammad Rezwanul Huq, Andreas Wombacher, Peter M....
ICDE
2007
IEEE
1577views Database» more  ICDE 2007»
15 years 7 months ago
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to...
Ninghui Li, Tiancheng Li, Suresh Venkatasubramania...