Sciweavers

67 search results - page 12 / 14
» Anonymizing transaction databases for publication
Sort
View
TODS
2010
108views more  TODS 2010»
13 years 4 months ago
A survey of B-tree locking techniques
: © A survey of B-tree locking techniques Goetz Graefe HP Laboratories HPL-2010-9 storage systems, databases, B-tree, indexes, concurrency control, locking B-trees have been ubiqu...
Goetz Graefe
IRI
2007
IEEE
14 years 11 days ago
Natural Language Processing and e-Government: Extracting Reusable Crime Report Information
Crime reporting needs to be possible 24/7. Although 911 and tip-lines are the most publicized reporting mechanisms, several other options exist, ranging from inperson reporting to...
Alicia Iriberri, Gondy Leroy
ICDT
2009
ACM
119views Database» more  ICDT 2009»
14 years 6 months ago
Analysis of sampling techniques for association rule mining
In this paper, we present a comprehensive theoretical analysis of the sampling technique for the association rule mining problem. Most of the previous works have concentrated only...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...

Publication
243views
15 years 5 months ago
Enabling Private Continuous Queries For Revealed User Locations
Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based service...
Chi-Yin Chow, Mohamed F. Mokbel
DSS
2007
226views more  DSS 2007»
13 years 6 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri