Sciweavers

185 search results - page 35 / 37
» Non-homogeneous generalization in privacy preserving data pu...
Sort
View
DEBS
2008
ACM
13 years 9 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
14 years 8 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
DAWAK
2006
Springer
13 years 11 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
14 years 1 months ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...
GECCO
2007
Springer
197views Optimization» more  GECCO 2007»
14 years 1 months ago
Computational intelligence techniques: a study of scleroderma skin disease
This paper presents an analysis of microarray gene expression data from patients with and without scleroderma skin disease using computational intelligence and visual data mining ...
Julio J. Valdés, Alan J. Barton