Sciweavers

170 search results - page 2 / 34
» Deriving Private Information from Perturbed Data Using IQR B...
Sort
View
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
13 years 10 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du
CSDA
2006
95views more  CSDA 2006»
13 years 4 months ago
Identifying influential multinomial observations by perturbation
The assessment of the influence of individual observations on the outcome of the analysis by perturbation has received a lot of attention for situations in which the observations ...
S. O. Nyangoma, W.-K. Fung, R. C. Jansen
PVLDB
2008
132views more  PVLDB 2008»
13 years 4 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
TVCG
2008
103views more  TVCG 2008»
13 years 4 months ago
Visualization of Myocardial Perfusion Derived from Coronary Anatomy
Visually assessing the effect of the coronary artery anatomy on the perfusion of the heart muscle in patients with coronary artery disease remains a challenging task. We explore th...
Maurice Termeer, Javier Oliván Bescó...
IGIS
1994
118views GIS» more  IGIS 1994»
13 years 8 months ago
Surface Modelling with Guaranteed Consistency - An Object-Based Approach
There have been many interpolation methods developed over the years, each with their own problems. One of the biggest limitations in many applications is the non-correspondence of...
Christopher M. Gold, Thomas Roos