Sciweavers

10670 search results - page 123 / 2134
» Required Information Release
Sort
View
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
16 years 3 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
PODS
2004
ACM
109views Database» more  PODS 2004»
16 years 2 months ago
On the Complexity of Optimal K-Anonymity
The technique of k-anonymization has been proposed in the literature as an alternative way to release public information, while ensuring both data privacy and data integrity. We p...
Adam Meyerson, Ryan Williams
SOSE
2008
IEEE
15 years 8 months ago
Towards SOA-Based Code Defect Analysis
Static code analysis is the analysis of software that is performed to acquire information concerning the dynamic behavior of programs built from that software, without actually ex...
Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Ho...
127
Voted
ISNN
2007
Springer
15 years 8 months ago
Combining News and Technical Indicators in Daily Stock Price Trends Prediction
Stock market prediction has always been one of the hottest topics in research, as well as a great challenge due to its complex and volatile nature. However, most of the existing me...
Yu Zheng Zhai, Arthur L. Hsu, Saman K. Halgamuge
PAKDD
2007
ACM
181views Data Mining» more  PAKDD 2007»
15 years 8 months ago
Practical Issues on Privacy-Preserving Health Data Mining
Privacy-preserving data mining techniques could encourage health data custodians to provide accurate information for mining by ensuring that the data mining procedures and results ...
Huidong Jin