Sciweavers

743 search results - page 43 / 149
» Performance Measurements for Privacy Preserving Data Mining
Sort
View
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
15 years 3 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
145
Voted
DKE
2010
167views more  DKE 2010»
14 years 11 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
291
Voted
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 2 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton
SC
2005
ACM
15 years 7 months ago
PerfExplorer: A Performance Data Mining Framework For Large-Scale Parallel Computing
Parallel applications running on high-end computer systems manifest a complexity of performance phenomena. Tools to observe parallel performance attempt to capture these phenomena...
Kevin A. Huck, Allen D. Malony
102
Voted
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
15 years 8 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...