-
3
-
-
0003473816
-
-
SIAM, Philadelphia, PA
-
R. Barrett, M. Berry, T. F. Chan, J. Demmel, J. Donato, J. Dongarra, V. Eijkhout, R. Pozo, C. Romine, and H. V. der Vorst. Templates for the Solution of Linear Systems: Building Blocks for Iterative Methods, 2nd Edition. SIAM, Philadelphia, PA, 1994.
-
(1994)
Templates for the Solution of Linear Systems: Building Blocks for Iterative Methods, 2nd Edition
-
-
Barrett, R.1
Berry, M.2
Chan, T.F.3
Demmel, J.4
Donato, J.5
Dongarra, J.6
Eijkhout, V.7
Pozo, R.8
Romine, C.9
Der Vorst, H.V.10
-
5
-
-
10044273842
-
Tools for privacy preserving data mining
-
December
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. Tools for privacy preserving data mining. SIGKDD Explorations, 4(2), December 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
6
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Lake Buena Vista, Florida, USA, April
-
W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In Proceedings of the 4th SIAM International Conference on Data Mining, Lake Buena Vista, Florida, USA, April 2004.
-
(2004)
Proceedings of the 4th SIAM International Conference on Data Mining
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
8
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, CA, June
-
A. Evfimievski, J. E. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003), San Diego, CA, June 2003.
-
(2003)
Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003)
-
-
Evfimievski, A.1
Gehrke, J.E.2
Srikant, R.3
-
9
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, Canada, July
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 2002.
-
(2002)
Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
10
-
-
29844448786
-
A new privacy model and association-rule mining algorithm for large-scale distributed environments
-
Seattle, WA, USA, August
-
B. Gilburd, A. Schuster, and R. Wolff. A new privacy model and association-rule mining algorithm for large-scale distributed environments. In 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Seattle, WA, USA, August 2004.
-
(2004)
10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
-
-
Gilburd, B.1
Schuster, A.2
Wolff, R.3
-
15
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, WA, USA, August
-
M. Kantarcioglu, J. Jin, and C. Clifton. When do data mining results violate privacy? In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2004), Seattle, WA, USA, August 2004.
-
(2004)
Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2004)
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
16
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, Florida, November 19-22, 2003
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, On the privacy preserving properties of random data perturbation techniques. In the IEEE International Conference on Data Mining, Melbourne, Florida, November 19-22, 2003 2003.
-
(2003)
IEEE International Conference on Data Mining
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
18
-
-
19544375935
-
Privacy sensitive bayesian network parameter learning
-
Brighton, UK, November
-
D. Meng, K. Sivakumar, and H. Kargupta. Privacy sensitive bayesian network parameter learning. In The Fourth IEEE International Conference on Data Mining(ICDM), Brighton, UK, November 2004.
-
(2004)
The Fourth IEEE International Conference on Data Mining(ICDM)
-
-
Meng, D.1
Sivakumar, K.2
Kargupta, H.3
-
19
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
December
-
B. Pinkas. Cryptographic techniques for privacy-preserving data mining. SIGKDD Explorations, 4(2), December 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
-
-
Pinkas, B.1
-
22
-
-
12244286332
-
Privacy preserving regression modelling via distributed computation
-
Seattle, WA, USA, August
-
A. Sanil, A. Karr, X. Lin, and J. Reiter. Privacy preserving regression modelling via distributed computation. In 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Seattle, WA, USA, August 2004.
-
(2004)
10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
-
-
Sanil, A.1
Karr, A.2
Lin, X.3
Reiter, J.4
-
25
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
Brighton, UK, November
-
K. Wang, P. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In The Fourth IEEE International Conference on Data Mining(ICDM), Brighton, UK, November 2004.
-
(2004)
The Fourth IEEE International Conference on Data Mining(ICDM)
-
-
Wang, K.1
Yu, P.2
Chakraborty, S.3
-
26
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
March
-
S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. The American Statistical Association, 60(309):63-69, March 1965.
-
(1965)
The American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|