Sciweavers

1701 search results - page 93 / 341
» Providing k-anonymity in data mining
Sort
View
ICWS
2009
IEEE
15 years 7 months ago
Service-Oriented Architecture for Privacy-Preserving Data Mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers t...
Thomas Trojer, Benjamin C. M. Fung, Patrick C. K. ...
CCGRID
2009
IEEE
15 years 4 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 10 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
AUSDM
2007
Springer
165views Data Mining» more  AUSDM 2007»
15 years 1 months ago
A New Efficient Privacy-Preserving Scalar Product Protocol
Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically repre...
Artak Amirbekyan, Vladimir Estivill-Castro
KAIS
2000
86views more  KAIS 2000»
14 years 9 months ago
A Mathematical Foundation for Improved Reduct Generation in Information Systems
When data sets are analyzed, statistical pattern recognition is often used to find the information hidden in the data. Another approach to information discovery is data mining. Dat...
Janusz A. Starzyk, Dale E. Nelson, Kirk Sturtz