Sciweavers

2705 search results - page 50 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 10 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...
GI
2009
Springer
13 years 6 months ago
Modelling Missing Values for Audience Measurement in Outdoor Advertising Using GPS Data
Abstract: GPS technology has made it possible to evaluate the performance of outdoor advertising campaigns in an objective manner. Given the GPS trajectories of a sample of test pe...
Michael May, Christine Körner, Dirk Hecker, M...
EDBT
2008
ACM
154views Database» more  EDBT 2008»
14 years 9 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
SDM
2010
SIAM
213views Data Mining» more  SDM 2010»
13 years 10 months ago
Spectral Analysis of Signed Graphs for Clustering, Prediction and Visualization
We study the application of spectral clustering, prediction and visualization methods to graphs with negatively weighted edges. We show that several characteristic matrices of gra...
Jérôme Kunegis, Stephan Schmidt, Andr...