Sciweavers

765 search results - page 14 / 153
» Modeling and Integrating Background Knowledge in Data Anonym...
Sort
View
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 5 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 16 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Tools enabling the elucidation of molecular pathways active in human disease: Application to Hepatitis C virus infection
Background: The extraction of biological knowledge from genome-scale data sets requires its analysis in the context of additional biological information. The importance of integra...
David J. Reiss, Iliana Avila-Campillo, Vesteinn Th...
ICTAI
1993
IEEE
13 years 12 months ago
Integrating Constraints, Composite Objects and Tasks in a Knowledge Representation System
Tropes, an object-based knowledge representation system, has been added three important intertwined features: constraints, composite objects and tasks. Constraints provide a decla...
Jérôme Gensel, Pierre Girard, Olivier...