Sciweavers

1005 search results - page 68 / 201
» Privacy Preserving Clustering
Sort
View
ISI
2005
Springer
14 years 3 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
ICTAI
2006
IEEE
14 years 4 months ago
Preserving Patterns in Bipartite Graph Partitioning
This paper describes a new bipartite formulation for word-document co-clustering such that hyperclique patterns, strongly affiliated documents in this case, are guaranteed not to ...
Tianming Hu, Chao Qu, Chew Lim Tan, Sam Yuan Sung,...
ESORICS
2002
Springer
14 years 9 months ago
Confidentiality-Preserving Refinement is Compositional - Sometimes
Confidentiality-preserving refinement describes a relation between a specification and an implementation that ensures that all confidentiality properties required in the specificat...
Thomas Santen, Maritta Heisel, Andreas Pfitzmann
ISPD
1998
ACM
110views Hardware» more  ISPD 1998»
14 years 2 months ago
Performance-driven soft-macro clustering and placement by preserving HDL design hierarchy
In this paper, we present a performance-driven softmacro clustering and placement method which preserves HDL design hierarchy to guide the soft-macro placement process. We also pr...
Hsiao-Pin Su, Allen C.-H. Wu, Youn-Long Lin
OOPSLA
1998
Springer
14 years 2 months ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils