Sciweavers

29 search results - page 3 / 6
» A survey of confidential data storage and deletion methods
Sort
View
PKDD
2005
Springer
138views Data Mining» more  PKDD 2005»
13 years 11 months ago
Indexed Bit Map (IBM) for Mining Frequent Sequences
Sequential pattern mining has been an emerging problem in data mining. In this paper, we propose a new algorithm for mining frequent sequences. It processes only one scan of the da...
Lionel Savary, Karine Zeitouni
SIGMOD
2003
ACM
96views Database» more  SIGMOD 2003»
14 years 5 months ago
Toward network data independence
A number of researchers have become interested in the design of global-scale networked systems and applications. Our thesis here is that the database community's principles a...
Joseph M. Hellerstein
USENIX
2008
13 years 8 months ago
FlexVol: Flexible, Efficient File Volume Virtualization in WAFL
zation is a well-known method of abstracting physical resources and of separating the manipulation and use of logical resources from their underlying implementation. We have used ...
John K. Edwards, Daniel Ellard, Craig Everhart, Ro...
EDBT
2008
ACM
111views Database» more  EDBT 2008»
14 years 5 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 5 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu