Sciweavers

2272 search results - page 119 / 455
» Provable Data Privacy
Sort
View
ESOP
2004
Springer
14 years 2 months ago
Extracting a Data Flow Analyser in Constructive Logic
Abstract. We show how to formalise a constraint-based data flow analysis in the specification language of the Coq proof assistant. This involves defining a dependent type of lat...
David Cachera, Thomas P. Jensen, David Pichardie, ...
GLOBE
2009
Springer
14 years 1 months ago
Designing, Specifying and Querying Metadata for Virtual Data Integration Systems
Abstract. We show how to specify and use the metadata for a virtual and relational data integration system under the local-as-view (LAV) approach. We use XML and RuleML for represe...
Leopoldo E. Bertossi, Gayathri Jayaraman
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
14 years 2 months ago
Privacy-Preserving Top-K Queries
Processing of top-k queries has been attracting considerable attention. Much of the work assumes distributed data, with each site holding a different set of attributes for the sam...
Jaideep Vaidya, Chris Clifton
VLDB
2002
ACM
106views Database» more  VLDB 2002»
13 years 9 months ago
Approximate Frequency Counts over Data Streams
We present algorithms for computing frequency counts exceeding a user-specified threshold over data streams. Our algorithms are simple and have provably small memory footprints. A...
Gurmeet Singh Manku, Rajeev Motwani
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 9 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....