Sciweavers

38 search results - page 4 / 8
» Transforming data to satisfy privacy constraints
Sort
View
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 7 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
WWW
2010
ACM
13 years 6 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 6 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
VLDB
2002
ACM
118views Database» more  VLDB 2002»
13 years 6 months ago
Translating Web Data
We present a novel framework for mapping between any combination of XML and relational schemas, in which a high-level, userspecified mapping is translated into semantically meanin...
Lucian Popa, Yannis Velegrakis, Renée J. Mi...
WEBI
2010
Springer
13 years 4 months ago
DSP: Robust Semi-supervised Dimensionality Reduction Using Dual Subspace Projections
High-dimensional data usually incur learning deficiencies and computational difficulties. We present a novel semi-supervised dimensionality reduction technique that embeds high-dim...
Su Yan, Sofien Bouaziz, Dongwon Lee