Sciweavers

901 search results - page 83 / 181
» On Anonymization of String Data
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 7 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CIKM
2008
Springer
15 years 3 months ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 1 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
SDM
2009
SIAM
172views Data Mining» more  SDM 2009»
15 years 10 months ago
Travel-Time Prediction Using Gaussian Process Regression: A Trajectory-Based Approach.
This paper is concerned with the task of travel-time prediction for an arbitrary origin-destination pair on a map. Unlike most of the existing studies, which focus only on a parti...
Sei Kato, Tsuyoshi Idé