Sciweavers

901 search results - page 80 / 181
» On Anonymization of String Data
Sort
View
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 7 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
BIBM
2008
IEEE
217views Bioinformatics» more  BIBM 2008»
15 years 8 months ago
Combining Hierarchical Inference in Ontologies with Heterogeneous Data Sources Improves Gene Function Prediction
The study of gene function is critical in various genomic and proteomic fields. Due to the availability of tremendous amounts of different types of protein data, integrating thes...
Xiaoyu Jiang, Naoki Nariai, Martin Steffen, Simon ...
EDBTW
2006
Springer
15 years 5 months ago
An Integrated Platform for Analyzing Molecular-Biological Data Within Clinical Studies
To investigate molecular-biological causes and effects of diseases and their therapies it becomes increasingly important to combine data from clinical trials with high volumes of e...
Toralf Kirsten, Jörg Lange, Erhard Rahm
EDBT
2012
ACM
262views Database» more  EDBT 2012»
13 years 3 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
SPW
2004
Springer
15 years 6 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...