Sciweavers

AEI
2007
91views more  AEI 2007»
13 years 11 months ago
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Data mining mechanisms have widely been applied in various businesses and manufacturing companies across many industry sectors. Sharing data or sharing mined rules has become a tr...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
EDBT
2010
ACM
123views Database» more  EDBT 2010»
14 years 3 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish
EDBT
2009
ACM
98views Database» more  EDBT 2009»
14 years 6 months ago
A runtime approach to model-independent schema and data translation
A runtime approach to model-generic translation of schema and data is proposed. It is based on our previous work on MIDST, a platform conceived to perform translations in an off-...
Paolo Atzeni, Luigi Bellomarini, Francesca Bugiott...