Sciweavers

32 search results - page 6 / 7
» sigkdd 2002
Sort
View
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 10 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
SIGKDD
2002
93views more  SIGKDD 2002»
13 years 10 months ago
Randomization in Privacy-Preserving Data Mining
Suppose there are many clients, each having some personal information, and one server, which is interested only in aggregate, statistically significant, properties of this informa...
Alexandre V. Evfimievski
SIGKDD
2002
83views more  SIGKDD 2002»
13 years 10 months ago
Towards Effective and Interpretable Data Mining by Visual Interaction
The primary aim of most data mining algorithms is to facilitate the discovery of concise and interpretable information from large amounts of data. However, many of the current for...
Charu C. Aggarwal
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 10 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier
SIGKDD
2002
81views more  SIGKDD 2002»
13 years 10 months ago
P-tree Classification of Yeast Gene Deletion Data
Genomics data has many properties that make it different from "typical" relational data. The presence of multi-valued attributes as well as the large number of null valu...
Amal Perera, Anne Denton, Pratap Kotala, William J...