Sciweavers

ICDE
2007
IEEE
115views Database» more  ICDE 2007»
14 years 7 months ago
A Genetic Approach to Multivariate Microaggregation for Database Privacy
Microaggregation is a technique used to protect privacy in databases and location-based services. We propose a new hybrid technique for multivariate microaggregation. Our techniqu...
Antoni Martínez-Ballesté, Agusti Sol...
FUZZIEEE
2007
IEEE
14 years 7 months ago
Single Pass Fuzzy C Means
— Recently several algorithms for clustering large data sets or streaming data sets have been proposed. Most of them address the crisp case of clustering, which cannot be easily ...
Prodip Hore, Lawrence O. Hall, Dmitry B. Goldgof
ESCIENCE
2007
IEEE
14 years 7 months ago
Community Training: Partitioning Schemes in Good Shape for Federated Data Grids
In federated Data Grids, individual institutions share their data sets within a community to enable collaborative data analysis. Data access needs to be provided in a scalable fas...
Tobias Scholl, Richard Kuntschke, Angelika Reiser,...
CIDM
2007
IEEE
14 years 7 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal
CIBCB
2007
IEEE
14 years 7 months ago
Motifs and Modules in Fractured Functional Yeast Networks
The integration of diverse data sets into probabilistic functional networks is an active and important area of research in systems biology. In this paper we fracture a previously p...
Jennifer Hallinan, Anil Wipat
AIMSA
2008
Springer
14 years 7 months ago
Prototypes Based Relational Learning
Relational instance-based learning (RIBL) algorithms offer high prediction capabilities. However, they do not scale up well, specially in domains where there is a time bound for c...
Rocío García-Durán, Fernando ...
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
14 years 7 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
NDSS
2008
IEEE
14 years 7 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
IV
2008
IEEE
94views Visualization» more  IV 2008»
14 years 7 months ago
Visualizing Statistical Properties of Smoothly Brushed Data Subsets
In many application fields, the statistical properties of data sets are of great interest for data analysts. Since local variations can occur especially in large data sets, it is...
Andrea Unger, Philipp Muigg, Helmut Doleisch, Heid...
INFOCOM
2008
IEEE
14 years 7 months ago
Algorithms for Low-Latency Remote File Synchronization
The remote file synchronization problem is how to update an outdated version of a file located on one machine to the current version located on another machine with a minimal am...
Hao Yan, Utku Irmak, Torsten Suel