Sciweavers

7163 search results - page 23 / 1433
» Privacy-Preserving Data Mining
Sort
View
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
TRUSTBUS
2004
Springer
14 years 3 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
HASE
2008
IEEE
14 years 4 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina
IJCMAM
2010
133views more  IJCMAM 2010»
13 years 7 months ago
Privacy Preserving Integration of Health Care Data
For health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health inform...
Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R....
GRC
2007
IEEE
13 years 10 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough