Sciweavers

387 search results - page 58 / 78
» Data mining with differential privacy
Sort
View
CHI
2008
ACM
15 years 10 months ago
It's Mine, Don't Touch!: interactions at a large multi-touch display in a city centre
We present data from detailed observations of CityWall, a large multi-touch display installed in a central location in Helsinki, Finland. During eight days of installation, 1199 p...
Peter Peltonen, Esko Kurvinen, Antti Salovaara, Gi...
PODS
2005
ACM
96views Database» more  PODS 2005»
15 years 10 months ago
Privacy-enhancing k-anonymization of customer data
In order to protect individuals' privacy, the technique of kanonymization has been proposed to de-associate sensitive attributes from the corresponding identifiers. In this p...
Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
AISADM
2005
Springer
15 years 3 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
ISI
2007
Springer
15 years 4 months ago
Mining Higher-Order Association Rules from Distributed Named Entity Databases
The burgeoning amount of textual data in distributed sources combined with the obstacles involved in creating and maintaining central repositories motivates the need for effective ...
Shenzhi Li, Christopher D. Janneck, Aditya P. Bela...
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 3 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du