Sciweavers

98 search results - page 1 / 20
» Achieving anonymity via clustering
Sort
View
56
Voted
PODS
2006
ACM
106views Database» more  PODS 2006»
15 years 11 months ago
Achieving anonymity via clustering
An Zhu, Dilys Thomas, Gagan Aggarwal, Krishnaram K...
82
Voted
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
15 years 15 hour ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
DAWAK
2006
Springer
15 years 2 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
76
Voted
CLUSTER
2002
IEEE
15 years 3 months ago
Shell over a Cluster (SHOC): Towards Achieving Single System Image via the Shell
With dramatic improvements in cost-performance, the use of clusters of personal computers is fast becoming widespread. For ease of use and management, a Single System Image (SSI) ...
C. M. Tan, C. P. Tan, Weng-Fai Wong
TPDS
2008
133views more  TPDS 2008»
14 years 10 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu