Sciweavers

1335 search results - page 94 / 267
» Privacy in Database Publishing
Sort
View
129
Voted
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
15 years 10 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
156
Voted
ICDCIT
2004
Springer
15 years 9 months ago
Querying XML Documents from a Relational Database in the Presence of DTDs
Abstract. Many researchers have investigated the problem of storing and querying XML documents using an RDBMS. Two situations are considered in this approach based on whether or no...
Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Fars...
PKDD
2000
Springer
123views Data Mining» more  PKDD 2000»
15 years 7 months ago
Supporting Discovery in Medicine by Association Rule Mining of Bibliographic Databases
The paper presents an interactive discovery support system for the field of medicine. The intended users of the system are medical researchers. The goal of the system is: for a giv...
Dimitar Hristovski, Saso Dzeroski, Borut Peterlin,...
103
Voted
PVLDB
2008
71views more  PVLDB 2008»
15 years 3 months ago
Read-optimized databases, in depth
Recently, a number of papers have been published showing the benefits of column stores over row stores. However, the research comparing the two in an "apples-to-apples" ...
Allison L. Holloway, David J. DeWitt
SRDS
2006
IEEE
15 years 10 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...