Sciweavers

1497 search results - page 157 / 300
» Constraint Databases: A Survey
Sort
View
FOCS
2010
IEEE
14 years 8 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 11 months ago
MultiRelational k-Anonymity
k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much...
Mehmet Ercan Nergiz, Chris Clifton, A. Erhan Nergi...
164
Voted
ICDE
2006
IEEE
153views Database» more  ICDE 2006»
15 years 11 months ago
ConQueSt: a Constraint-based Querying System for Exploratory Pattern Discovery
ConQueSt is a constraint-based querying system devised with the aim of supporting the intrinsically exploratory nature of pattern discovery. It provides users with an expressive c...
Francesco Bonchi, Fosca Giannotti, Claudio Lucches...
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 4 months ago
Research issues and overview of economic models in Mobile-P2P networks
The mobile-P2P paradigm is becoming increasingly popular. Existing mobile-P2P solutions largely do not consider economic incentive models for enticing peer participation without e...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
78
Voted
IDEAS
2007
IEEE
138views Database» more  IDEAS 2007»
15 years 4 months ago
On Transversal Hypergraph Enumeration in Mining Sequential Patterns
The transversal hypergraph enumeration based algorithms can be efficient in mining frequent itemsets, however it is difficult to apply them to sequence mining problems. In this ...
Dong (Haoyuan) Li, Anne Laurent, Maguelonne Teisse...