Sciweavers

5255 search results - page 334 / 1051
» Formal Methods for Privacy
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 5 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
INFSOF
2002
147views more  INFSOF 2002»
15 years 4 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
SIAMSC
2008
140views more  SIAMSC 2008»
15 years 4 months ago
Compact Fourier Analysis for Designing Multigrid Methods
The convergence of Multigrid methods can be analyzed based on a Fourier analysis of the method or by proving certain inequalities that have to be fulfilled by the smoother and by t...
Thomas K. Huckle
JMLR
2002
111views more  JMLR 2002»
15 years 4 months ago
The Learning-Curve Sampling Method Applied to Model-Based Clustering
We examine the learning-curve sampling method, an approach for applying machinelearning algorithms to large data sets. The approach is based on the observation that the computatio...
Christopher Meek, Bo Thiesson, David Heckerman
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 5 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan