Sciweavers

210 search results - page 14 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
108
Voted
SIGMOD
2011
ACM
222views Database» more  SIGMOD 2011»
14 years 2 months ago
Data generation using declarative constraints
We study the problem of generating synthetic databases having declaratively specified characteristics. This problem is motivated by database system and application testing, data ...
Arvind Arasu, Raghav Kaushik, Jian Li
121
Voted
CIKM
2009
Springer
15 years 4 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 2 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
77
Voted
DNIS
2007
Springer
93views Database» more  DNIS 2007»
15 years 1 months ago
Location Privacy in Geospatial Decision-Making
Geospatial data-sets are becoming commonplace in many application domains, especially in the area of decision-making. Current state-of-the-art in geospatial systems either lack the...
Cyrus Shahabi, Ali Khoshgozaran
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 4 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...