Sciweavers

1294 search results - page 74 / 259
» Privacy and Data Mining: New Developments and Challenges
Sort
View
TKDE
2008
136views more  TKDE 2008»
14 years 9 months ago
Efficient Correlation Search from Graph Databases
Correlation mining has gained great success in many application domains for its ability to capture underlying dependencies between objects. However, research on correlation mining ...
Yiping Ke, James Cheng, Wilfred Ng
PVLDB
2008
101views more  PVLDB 2008»
14 years 9 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
CCS
2010
ACM
15 years 4 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
PERCOM
2007
ACM
15 years 9 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
CF
2009
ACM
15 years 4 months ago
Mapping the LU decomposition on a many-core architecture: challenges and solutions
Recently, multi-core architectures with alternative memory subsystem designs have emerged. Instead of using hardwaremanaged cache hierarchies, they employ software-managed embedde...
Ioannis E. Venetis, Guang R. Gao