Sciweavers

1390 search results - page 202 / 278
» Self-Sizing of Clustered Databases
Sort
View
VLDB
2008
ACM
147views Database» more  VLDB 2008»
15 years 10 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
SIGMOD
2005
ACM
102views Database» more  SIGMOD 2005»
15 years 10 months ago
On six degrees of separation in DBLP-DB and more
An extensive bibliometric study on the db community using the collaboration network constructed from DBLP data is presented. Among many, we have found that (1) the average distanc...
Ergin Elmacioglu, Dongwon Lee
SIGMOD
2005
ACM
136views Database» more  SIGMOD 2005»
15 years 10 months ago
Peer-to-peer management of XML data: issues and research challenges
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. The widespread use of XML as a...
Georgia Koloniari, Evaggelia Pitoura
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 10 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
ICDE
2010
IEEE
209views Database» more  ICDE 2010»
15 years 4 months ago
Optimal tree node ordering for child/descendant navigations
Abstract— There are many applications in which users interactively access huge tree data by repeating set-based navigations. In this paper, we focus on label-specific/wildcard c...
Atsuyuki Morishima, Keishi Tajima, Masateru Tadais...