-
1
-
-
0041783510
-
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, in: ACM SIGMOD, May 2000, pp. 439-450.
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, in: ACM SIGMOD, May 2000, pp. 439-450.
-
-
-
-
2
-
-
0242498488
-
An analysis of four missing data treatment methods for supervised learning
-
Batista G.E.A.P.A., and Monard M.C. An analysis of four missing data treatment methods for supervised learning. Applied Artificial Intelligence 17 5 (2003) 519-533
-
(2003)
Applied Artificial Intelligence
, vol.17
, Issue.5
, pp. 519-533
-
-
Batista, G.E.A.P.A.1
Monard, M.C.2
-
5
-
-
0041611508
-
Nearest neighborhood imputation for survey data
-
Chen J., and Shao J. Nearest neighborhood imputation for survey data. Journal of Official Statistics 16 2 (2000) 113-131
-
(2000)
Journal of Official Statistics
, vol.16
, Issue.2
, pp. 113-131
-
-
Chen, J.1
Shao, J.2
-
6
-
-
34249966007
-
The CN2 induction algorithm
-
Clark P., and Niblett T. The CN2 induction algorithm. Machine Learning 3 4 (1989) 261-283
-
(1989)
Machine Learning
, vol.3
, Issue.4
, pp. 261-283
-
-
Clark, P.1
Niblett, T.2
-
7
-
-
39749164764
-
-
L. Coppola, M. Di Zio, O. Luzi, A. Ponti, M. Scanu, Bayesian networks for imputation in official statistics: a case study, in: DataClean Conference, 2000, pp. 30-31.
-
L. Coppola, M. Di Zio, O. Luzi, A. Ponti, M. Scanu, Bayesian networks for imputation in official statistics: a case study, in: DataClean Conference, 2000, pp. 30-31.
-
-
-
-
8
-
-
39749112808
-
-
I. Davidson, S.S. Ravi, Distributed pre-processing of data on networks of berkeley motes using non-parametric EM, in: Proceedings of SIAM SDM Workshop on Data Mining in Sensor Networks, 2005, pp. 17-27.
-
I. Davidson, S.S. Ravi, Distributed pre-processing of data on networks of berkeley motes using non-parametric EM, in: Proceedings of SIAM SDM Workshop on Data Mining in Sensor Networks, 2005, pp. 17-27.
-
-
-
-
9
-
-
2942529194
-
-
W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: Proceedings of the Fourth SIAM International Conference on Data Mining, 2004, pp. 222-233.
-
W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: Proceedings of the Fourth SIAM International Conference on Data Mining, 2004, pp. 222-233.
-
-
-
-
10
-
-
39749189737
-
-
A. Farhangfar, L. Kurgan, W. Pedrycz, Experimental analysis of methods for handling missing values in databases, in: Intelligent Computing: Theory and Applications II, 2004.
-
A. Farhangfar, L. Kurgan, W. Pedrycz, Experimental analysis of methods for handling missing values in databases, in: Intelligent Computing: Theory and Applications II, 2004.
-
-
-
-
12
-
-
0030362553
-
-
J.H. Friedman, R. Kohavi, Y. Yun, Lazy decision trees, in: Proceedings of 13th AAAI and 8th IAAI, 1996, pp. 717-724.
-
J.H. Friedman, R. Kohavi, Y. Yun, Lazy decision trees, in: Proceedings of 13th AAAI and 8th IAAI, 1996, pp. 717-724.
-
-
-
-
13
-
-
39749169989
-
-
B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen, On secure scalar product computation for privacy-preserving data mining, in: 7th ICISC, 2004.
-
B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen, On secure scalar product computation for privacy-preserving data mining, in: 7th ICISC, 2004.
-
-
-
-
15
-
-
39749166617
-
-
M. Halatchev and L. Gruenwald, Estimating missing values in related sensor data streams, in: Proceedings of the Eleventh International Conference on Management of Data, 2005, pp. 83-94.
-
M. Halatchev and L. Gruenwald, Estimating missing values in related sensor data streams, in: Proceedings of the Eleventh International Conference on Management of Data, 2005, pp. 83-94.
-
-
-
-
16
-
-
39749131934
-
-
M. Hu, S.M. Salvucci, M.P. Cohen, Evaluation of some popular imputation algorithms, in: The Survey Research Methods Section of the ASA, 1998, pp. 308-313.
-
M. Hu, S.M. Salvucci, M.P. Cohen, Evaluation of some popular imputation algorithms, in: The Survey Research Methods Section of the ASA, 1998, pp. 308-313.
-
-
-
-
17
-
-
24144457853
-
Extending oblivious transfer efficiently
-
Advances in Cryptology - CRYPTO '03: Proceedings of the 23rd Annual International Cryptology Conference, Springer-Verlag
-
Ishai Y., Kilian J., Nissim K., and Petrank E. Extending oblivious transfer efficiently. Advances in Cryptology - CRYPTO '03: Proceedings of the 23rd Annual International Cryptology Conference. Lecture Notes in Computer Science vol. 2729 (2003), Springer-Verlag 145-161
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
18
-
-
33745439412
-
-
G. Jagannathan, K. Pillaipakkamnatt, R. Wright, A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of the 6th SIAM International Conference on Data Mining, 2006, pp. 492-496.
-
G. Jagannathan, K. Pillaipakkamnatt, R. Wright, A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of the 6th SIAM International Conference on Data Mining, 2006, pp. 492-496.
-
-
-
-
19
-
-
41849100844
-
-
G. Jagannathan, R.N. Wright, Privacy-preserving data imputation, in: Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2006, pp. 535-540.
-
G. Jagannathan, R.N. Wright, Privacy-preserving data imputation, in: Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2006, pp. 535-540.
-
-
-
-
20
-
-
39749174654
-
-
M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: IEEE Workshop on Privacy-Preserving Data Mining, 2003.
-
M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: IEEE Workshop on Privacy-Preserving Data Mining, 2003.
-
-
-
-
21
-
-
0033225727
-
Imputation of missing data in industrial databases
-
Lakshminarayan K., Harp S.A., and Samad T. Imputation of missing data in industrial databases. Applied Intelligence 11 3 (1999) 259-275
-
(1999)
Applied Intelligence
, vol.11
, Issue.3
, pp. 259-275
-
-
Lakshminarayan, K.1
Harp, S.A.2
Samad, T.3
-
23
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
25
-
-
0034819509
-
-
M. Naor, K. Nissim, Communication preserving protocols for secure function evaluation, in: STOC, 2001, pp. 590-599.
-
M. Naor, K. Nissim, Communication preserving protocols for secure function evaluation, in: STOC, 2001, pp. 590-599.
-
-
-
-
26
-
-
0032669864
-
-
M. Naor, B. Pinkas, Oblivious transfer and polynomial evaluation, in: 31st STOC, 1999, pp. 245-254.
-
M. Naor, B. Pinkas, Oblivious transfer and polynomial evaluation, in: 31st STOC, 1999, pp. 245-254.
-
-
-
-
27
-
-
64049119146
-
-
M. Naor, B. Pinkas, Efficient oblivious transfer protocols, in: 12th SODA, 2001, pp. 448-457.
-
M. Naor, B. Pinkas, Efficient oblivious transfer protocols, in: 12th SODA, 2001, pp. 448-457.
-
-
-
-
28
-
-
33744584654
-
Induction of decision trees
-
Quinlan J.R. Induction of decision trees. Machine Learning 1 1 (1986) 81-106
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
30
-
-
39749163732
-
-
W. Sarle, Prediction with missing inputs, in: Proceedings of the Fourth Joint Conference on Information Sciences, 1998, pp. 399-402.
-
W. Sarle, Prediction with missing inputs, in: Proceedings of the Fourth Joint Conference on Information Sciences, 1998, pp. 399-402.
-
-
-
-
31
-
-
0022882770
-
-
A.C.-C. Yao, How to generate and exchange secrets, in: 27th FOCS, 1986, pp. 162-167.
-
A.C.-C. Yao, How to generate and exchange secrets, in: 27th FOCS, 1986, pp. 162-167.
-
-
-
|