Sciweavers

85
Voted
TKDE
2011
472views more  TKDE 2011»
14 years 7 months ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao
136
Voted
EUSFLAT
2009
163views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
A Fuzzy Set Approach to Ecological Knowledge Discovery
Besides the problem of searching for effective methods for extracting knowledge from large databases (KDD) there are some additional problems with handling ecological data, namely ...
Arkadiusz Salski
117
Voted
JIDM
2010
122views more  JIDM 2010»
14 years 10 months ago
Revisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering w...
Stanley R. M. Oliveira, Osmar R. Zaïane
101
Voted
IJIIDS
2010
115views more  IJIIDS 2010»
14 years 10 months ago
Towards the preservation of functional dependency in XML data transformation
With the advent of XML as a data representation and exchange format over the web, a massive amount of data is being stored in XML. The task of data transformation for integration ...
Md. Sumon Shahriar, Jixue Liu
119
Voted
ISTA
2004
15 years 1 months ago
A Data Transformation Method Based on Schema Mapping
: Schema mapping is an important approach to solve the problem of data integration. This paper introduces a research prototype called SDE, which is a system for managing and facili...
You Li, Dongbo Liu, Weiming Zhang
100
Voted
DMIN
2006
138views Data Mining» more  DMIN 2006»
15 years 1 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel
101
Voted
ECWEB
2003
Springer
110views ECommerce» more  ECWEB 2003»
15 years 5 months ago
Transformation of XML Data Using an Unranked Tree Transducer
Transformation of data documents is of special importance to use XML as the universal data interchange format on the Web. Data transformation is used in many tasks that require dat...
Tadeusz Pankowski
120
Voted
DOLAP
2003
ACM
15 years 5 months ago
Using AutoMed metadata in data warehousing environments
Metadata management is an essential factor in data warehousing. In data warehousing environments, data is transformed and integrated into a single database from multiple autonomou...
Hao Fan, Alexandra Poulovassilis
107
Voted
SEMWEB
2004
Springer
15 years 5 months ago
Inferring Data Transformation Rules to Integrate Semantic Web Services
Abstract. OWL-S allows selecting, composing and invoking Web Serdifferent levels of abstraction: selection uses high level abstract descriptions, invocation uses low level groundi...
Bruce Spencer, Sandy Liu
110
Voted
SDMW
2004
Springer
15 years 5 months ago
Achieving Privacy Preservation when Sharing Data for Clustering
Abstract. In this paper, we address the problem of protecting the underlying attribute values when sharing data for clustering. The challenge is how to meet privacy requirements an...
Stanley R. M. Oliveira, Osmar R. Zaïane