Sciweavers

1005 search results - page 9 / 201
» Privacy Preserving Clustering
Sort
View
SIGKDD
2002
93views more  SIGKDD 2002»
13 years 9 months ago
Randomization in Privacy-Preserving Data Mining
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this informa...
Alexandre V. Evfimievski
SDM
2007
SIAM
195views Data Mining» more  SDM 2007»
13 years 11 months ago
On Anonymization of String Data
String data is especially important in the privacy preserving data mining domain because most DNA and biological data is coded as strings. In this paper, we will discuss a new met...
Charu C. Aggarwal, Philip S. Yu
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 10 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
TRUSTBUS
2004
Springer
14 years 3 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
CIKM
2006
Springer
14 years 1 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...