Sciweavers

387 search results - page 59 / 78
» Data mining with differential privacy
Sort
View
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
SICHERHEIT
2010
14 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
AGENTS
1999
Springer
15 years 2 months ago
Learning to Remove Internet Advertisements
This paper discusses improving the methodology introduced in Kushmerick’s paper about learning to remove internet advertisements. The aim is to reduce the model build time as we...
Nicholas Kushmerick
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
14 years 11 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
BIODATAMINING
2008
130views more  BIODATAMINING 2008»
14 years 10 months ago
Uncovering mechanisms of transcriptional regulations by systematic mining of cis regulatory elements with gene expression profil
Background: Contrary to the traditional biology approach, where the expression patterns of a handful of genes are studied at a time, microarray experiments enable biologists to st...
Qicheng Ma, Gung-Wei Chirn, Joseph D. Szustakowski...