Sciweavers

2272 search results - page 363 / 455
» Provable Data Privacy
Sort
View
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
14 years 10 months ago
A Sampling-Based Approach to Information Recovery
There has been a recent resurgence of interest in research on noisy and incomplete data. Many applications require information to be recovered from such data. For example, in sens...
Junyi Xie, Jun Yang 0001, Yuguo Chen, Haixun Wang,...
WWW
2008
ACM
14 years 10 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 9 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
14 years 3 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
ICDM
2007
IEEE
97views Data Mining» more  ICDM 2007»
14 years 3 months ago
Supervised Learning by Training on Aggregate Outputs
Supervised learning is a classic data mining problem where one wishes to be be able to predict an output value associated with a particular input vector. We present a new twist on...
David R. Musicant, Janara M. Christensen, Jamie F....