Sciweavers

210 search results - page 21 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
ICDE
1999
IEEE
151views Database» more  ICDE 1999»
16 years 2 months ago
Data Integration by Describing Sources with Constraint Databases
We develop a data integration approach for the efficient evaluation of queries over autonomous source databases. The approach is based on some novel applications and extensions of...
Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 6 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
ESORICS
2002
Springer
16 years 28 days ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
IDEAL
2005
Springer
15 years 6 months ago
Probabilistic Data Generation for Deduplication and Data Linkage
Abstract. In many data mining projects the data to be analysed contains personal information, like names and addresses. Cleaning and preprocessing of such data likely involves dedu...
Peter Christen
ICSE
2007
IEEE-ACM
15 years 7 months ago
TAXI - A Tool for XML-Based Testing
We present the tool TAXI which implements the XMLbased Partition Testing approach for the automated generation of XML Instances conforming to a given XML Schema. In addition it pr...
Antonia Bertolino, Jinghua Gao, Eda Marchetti, And...