Sciweavers

252 search results - page 22 / 51
» The Protection Of Public Health Data - A Case Study
Sort
View
JIB
2007
88views more  JIB 2007»
13 years 7 months ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal
ESA
2004
Springer
120views Algorithms» more  ESA 2004»
14 years 1 months ago
Solving Geometric Covering Problems by Data Reduction
We consider a scenario where stops are to be placed along an already existing public transportation network in order to improve its attractiveness for the customers. The core probl...
Steffen Mecke, Dorothea Wagner
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
14 years 7 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
ICDM
2007
IEEE
122views Data Mining» more  ICDM 2007»
14 years 2 months ago
Zonal Co-location Pattern Discovery with Dynamic Parameters
Zonal co-location patterns represent subsets of featuretypes that are frequently located in a subset of space (i.e., zone). Discovering zonal spatial co-location patterns is an im...
Mete Celik, James M. Kang, Shashi Shekhar
ACSAC
2008
IEEE
14 years 2 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger