Sciweavers

2272 search results - page 157 / 455
» Provable Data Privacy
Sort
View
GEOINFO
2007
13 years 12 months ago
Trajectory Data Warehouses: Proposal of Design and Application to Exploit Data
In this paper we are interested in storing and perform OLAP queries about various aggregate trajectory properties. We consider a data stream environment where a set of mobile objec...
Fernando J. Braz
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
14 years 10 months ago
Mining tree queries in a graph
We present an algorithm for mining tree-shaped patterns in a large graph. Novel about our class of patterns is that they can contain constants, and can contain existential nodes w...
Bart Goethals, Eveline Hoekx, Jan Van den Bussche
TCBB
2008
122views more  TCBB 2008»
13 years 10 months ago
Mixed Integer Linear Programming for Maximum-Parsimony Phylogeny Inference
Reconstruction of phylogenetic trees is a fundamental problem in computational biology. While excellent heuristic methods are available for many variants of this problem, new adva...
Srinath Sridhar, Fumei Lam, Guy E. Blelloch, R. Ra...
CIKM
2006
Springer
14 years 2 months ago
k nearest neighbor classification across multiple private databases
Distributed privacy preserving data mining tools are critical for mining multiple databases with a minimum information disclosure. We present a framework including a general model...
Li Xiong, Subramanyam Chitti, Ling Liu
AAAI
2006
13 years 11 months ago
Classification Spanning Private Databases
In this paper, we study the classification problem involving information spanning multiple private databases. The privacy challenges lie in the facts that data cannot be collected...
Ke Wang, Yabo Xu, Rong She, Philip S. Yu