Sciweavers

170 search results - page 4 / 34
» Deriving Private Information from Perturbed Data Using IQR B...
Sort
View
MOBICOM
2006
ACM
13 years 12 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 6 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
FUIN
2007
147views more  FUIN 2007»
13 years 5 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
CSDA
2006
67views more  CSDA 2006»
13 years 6 months ago
Sensitivity analysis of the strain criterion for multidimensional scaling
Multidimensional scaling (MDS) is a collection of data analytic techniques for constructing configurations of points from dissimilarity information about interpoint distances. Cla...
R. M. Lewis, M. W. Trosset
ADC
2006
Springer
139views Database» more  ADC 2006»
13 years 12 months ago
Peer-to-peer form based web information systems
The World Wide Web revolutionized the use of forms in everyday private and business life by allowing a move away from paper forms to easily accessible digital forms. Data captured...
Stijn Dekeyser, Jan Hidders, Richard Watson, Ron A...