Sciweavers

901 search results - page 109 / 181
» On Anonymization of String Data
Sort
View
BDA
1993
15 years 2 months ago
Querying and Updating the File
We show how structured data stored in files can benefit from standard database technology and in particular be queried and updated using database languages. We introduce the notio...
Serge Abiteboul, Sophie Cluet, Tova Milo
PR
2000
103views more  PR 2000»
15 years 1 months ago
Genetic algorithm-based clustering technique
A genetic algorithm-based clustering technique, called GA-clustering, is proposed in this article. The searching capability of genetic algorithms is exploited in order to search f...
Ujjwal Maulik, Sanghamitra Bandyopadhyay
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 1 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
ISSRE
2010
IEEE
14 years 12 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
16 years 2 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal