Sciweavers

114 search results - page 10 / 23
» When do data mining results violate privacy
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 1 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
CSSE
2006
IEEE
13 years 7 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
CIKM
2009
Springer
14 years 2 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
PKDD
2005
Springer
89views Data Mining» more  PKDD 2005»
14 years 27 days ago
Numbers in Multi-relational Data Mining
Numeric data has traditionally received little attention in the field of Multi-Relational Data Mining (MRDM). It is often assumed that numeric data can simply be turned into symbol...
Arno J. Knobbe, Eric K. Y. Ho
DEXAW
1998
IEEE
116views Database» more  DEXAW 1998»
13 years 11 months ago
Data-Mining: A Tightly-Coupled Implementation on a Parallel Database Server
Due to the increasingly di culty of discovering patterns in real-world databases using only conventional OLAP tools, an automated process such as data mining is currently essentia...
Mauro Sousa, Marta Mattoso, Nelson F. F. Ebecken