Sciweavers

1335 search results - page 214 / 267
» Privacy in Database Publishing
Sort
View
EDBT
2008
ACM
146views Database» more  EDBT 2008»
16 years 2 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 1 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
15 years 8 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
15 years 8 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
15 years 8 months ago
Modeling Quality of Information in Multi-sensor Surveillance Systems
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...