Sciweavers

1005 search results - page 69 / 201
» Privacy Preserving Clustering
Sort
View
EVOW
2005
Springer
14 years 3 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
PVLDB
2010
65views more  PVLDB 2010»
13 years 8 months ago
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
The principle of anonymization for data sharing has become a very popular paradigm for the preservation of privacy of the data sub
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh S...
ESORICS
2004
Springer
14 years 3 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
GD
1999
Springer
14 years 2 months ago
Planarity-Preserving Clustering and Embedding for Large Planar Graphs
In this paper we present a novel approach for cluster-based drawing of large planar graphs that maintains planarity. Our technique works for arbitrary planar graphs and produces a ...
Christian A. Duncan, Michael T. Goodrich, Stephen ...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 11 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu