Sciweavers

2705 search results - page 170 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 8 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
DAWAK
1999
Springer
14 years 2 months ago
Modeling KDD Processes within the Inductive Database Framework
One of the most challenging problems in data manipulation in the future is to be able to e ciently handle very large databases but also multiple induced properties or generalizatio...
Jean-François Boulicaut, Mika Klemettinen, ...
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
FMICS
2010
Springer
13 years 10 months ago
Range Analysis of Microcontroller Code Using Bit-Level Congruences
Bitwise instructions, loops and indirect data access pose difficult challenges to the verification of microcontroller programs. In particular, it is necessary to show that an indir...
Jörg Brauer, Andy King, Stefan Kowalewski
KDD
2009
ACM
161views Data Mining» more  KDD 2009»
14 years 5 months ago
Interactive spatio-temporal cluster analysis of VAST challenge 2008 datasets
We describe a visual analytics method supporting the analysis of two different types of spatio-temporal data, point events and trajectories of moving agents. The method combines c...
Gennady L. Andrienko, Natalia V. Andrienko