Sciweavers

5344 search results - page 21 / 1069
» Privacy-Preserving Set Operations
Sort
View
TDSC
2011
13 years 4 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
PVLDB
2011
13 years 4 months ago
Personalized Social Recommendations - Accurate or Private?
With the recent surge of social networks such as Facebook, new forms of recommendations have become possible – recommendations that rely on one’s social connections in order t...
Ashwin Machanavajjhala, Aleksandra Korolova, Atish...
ISCI
2006
95views more  ISCI 2006»
13 years 9 months ago
Roughness bounds in rough set operations
This paper presents some roughness bounds for rough set operations. The results show that a bound of the set operation can be determined from their operand's roughnesses. We ...
Yingjie Yang, Robert John
XIMEP
2005
ACM
155views Database» more  XIMEP 2005»
14 years 3 months ago
Deep Set Operators for XQuery
There are three set operators defined in XQuery, namely union, intersect and except. They take node sequences as operands, in which each node is identified by its node-ID and tr...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
TACS
1994
Springer
14 years 1 months ago
An Operational Approach to Combining Classical Set Theory and Functional Programming Languages
Abstract. We have designed a programming logic based on an integration of functional programming languages with classical set theory. The logic merges a classical view of equality ...
Douglas J. Howe, Scott D. Stoller