Sciweavers

269 search results - page 31 / 54
» Novel Algorithms for Privacy Preserving Utility Mining
Sort
View
ACSW
2006
13 years 8 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
PVLDB
2008
146views more  PVLDB 2008»
13 years 6 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
SIGSOFT
2008
ACM
14 years 8 months ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su
CIKM
2004
Springer
14 years 22 days ago
Mining gene expression datasets using density-based clustering
Given the recent advancement of microarray technologies, we present a density-based clustering approach for the purpose of co-expressed gene cluster identification. The underlyin...
Seokkyung Chung, Jongeun Jun, Dennis McLeod
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 2 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek