Sciweavers

901 search results - page 121 / 181
» On Anonymization of String Data
Sort
View
NIPS
2007
15 years 2 months ago
Compressed Regression
Recent research has studied the role of sparsity in high dimensional regression and signal reconstruction, establishing theoretical limits for recovering sparse models from sparse...
Shuheng Zhou, John D. Lafferty, Larry A. Wasserman
JDM
2006
96views more  JDM 2006»
15 years 1 months ago
Preparing Clinical Text for Use in Biomedical Research
Approximately 57 different types of clinical annotations construct a patient's medical record. The annotations include radiology reports, discharge summaries, and surgical an...
John Pestian, Lukasz Itert, Charlotte Anderson, Wl...
IJMI
2007
140views more  IJMI 2007»
15 years 1 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
16 years 1 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
CIKM
2009
Springer
15 years 8 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...