Sciweavers

116 search results - page 18 / 24
» On the Design and Quantification of Privacy Preserving Data ...
Sort
View
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
14 years 1 months ago
Metropolis Algorithms for Representative Subgraph Sampling
While data mining in chemoinformatics studied graph data with dozens of nodes, systems biology and the Internet are now generating graph data with thousands and millions of nodes....
Christian Hübler, Hans-Peter Kriegel, Karsten...
JCDL
2009
ACM
102views Education» more  JCDL 2009»
14 years 1 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson
DAWAK
2006
Springer
13 years 10 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
IJMI
2007
140views more  IJMI 2007»
13 years 7 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
TKDE
2008
156views more  TKDE 2008»
13 years 7 months ago
A Framework for Mining Sequential Patterns from Spatio-Temporal Event Data Sets
Given a large spatio-temporal database of events, where each event consists of the fields event ID, time, location, and event type, mining spatio-temporal sequential patterns ident...
Yan Huang, Liqin Zhang, Pusheng Zhang