Sciweavers

98 search results - page 1 / 20
» Achieving anonymity via clustering
Sort
View
PODS
2006
ACM
106views Database» more  PODS 2006»
14 years 4 months ago
Achieving anonymity via clustering
An Zhu, Dilys Thomas, Gagan Aggarwal, Krishnaram K...
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 5 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
DAWAK
2006
Springer
13 years 8 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
CLUSTER
2002
IEEE
13 years 9 months ago
Shell over a Cluster (SHOC): Towards Achieving Single System Image via the Shell
With dramatic improvements in cost-performance, the use of clusters of personal computers is fast becoming widespread. For ease of use and management, a Single System Image (SSI) ...
C. M. Tan, C. P. Tan, Weng-Fai Wong
TPDS
2008
133views more  TPDS 2008»
13 years 4 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu