-
1
-
-
33947403146
-
Distributed data mining in peer-to-peer networks
-
DOI 10.1109/MIC.2006.74
-
[1] S. Datta, K. Bhaduri, C. Giannella, "Distributed Data Mining in Peer-to-Peer Networks," IEEE Internet Computing 2006, 10(4), pp. 18-26. (Pubitemid 46444990)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.4
, pp. 18-26
-
-
Datta, S.1
Bhaduri, K.2
Giannella, C.3
Kargupta, H.4
Wolff, R.5
-
4
-
-
31544468696
-
Nonsmooth nonnegative matrix factorization (nsNMF)
-
DOI 10.1109/TPAMI.2006.60
-
[4] Pascual-Montano, J. Carazo, K. Kochi, D. Lehmann, & P. Pascual-Marqui, "Nonsmooth nonnegative matrix factorization (nsNMF)," IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28, pp. 403-415. (Pubitemid 43159636)
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.3
, pp. 403-415
-
-
Pascual-Montano, A.1
Carazo, J.M.2
Kochi, K.3
Lehmann, D.4
Pascual-Marqui, R.D.5
-
5
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. Verykios, E. Bertino, I. Fovino, L. Provenza, Y. Saygin, & Y. Theodoridis, "State-of-the-art in privacy preserving data mining," ACM SIGMOD Record, 2004, 3(1), pp. 50-57.
-
(2004)
ACM SIGMOD Record
, vol.3
, Issue.1
, pp. 50-57
-
-
Verykios, V.1
Bertino, E.2
Fovino, I.3
Provenza, L.4
Saygin, Y.5
Theodoridis, Y.6
-
6
-
-
49549118860
-
NNMF-based factorization techniques for high-accuracy privacy protection on non-negativevalued datasets
-
Hong Kong, China
-
J. Wang, W. Zhong, J. & Zhang, "NNMF-based factorization techniques for high-accuracy privacy protection on non-negativevalued datasets," Proceedings of the IEEE Conference on Data Mining 2006, International Workshop on Privacy Aspects of Date Mining (PADM 2006), Hong Kong, China. 2006, pp. 513-517.
-
(2006)
Proceedings of the IEEE Conference on Data Mining 2006, International Workshop on Privacy Aspects of Date Mining (PADM 2006)
, pp. 513-517
-
-
Wang, J.1
Zhong, W.J.2
Zhang3
-
7
-
-
33749339031
-
Singular value decomposition based data distortion strategy for privacy protection
-
S. Xu, J. Zhang, D. Han, & J. Wang, "Singular value decomposition based data distortion strategy for privacy protection," Knowledge and Information Systems, 2006, 10(3), pp. 383-397.
-
(2006)
Knowledge and Information Systems
, vol.10
, Issue.3
, pp. 383-397
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
-
8
-
-
24944561624
-
Data distortion for privacy protection in a terrorist analysis system
-
Atlanta, GA
-
S. Xu, J. Zhang, D. Han, & J. Wang, "Data distortion for privacy protection in a terrorist analysis system," Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA. 2005, pp. 459-464.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics
, pp. 459-464
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
-
9
-
-
38149092525
-
Entity Based Peer-to-Peer in a Data Grid Environment
-
Paris, France, July
-
B. Hudzia, L. McDermott, T. Illahi, and M. Kechadi, "Entity Based Peer-to-Peer in a Data Grid Environment," In the 17th IMACS World Congress Scientific Computation, Applied Mathematics and Simulation. Paris, France, July, 2005, pp. 11-15.
-
(2005)
The 17th IMACS World Congress Scientific Computation, Applied Mathematics and Simulation.
, pp. 11-15
-
-
Hudzia, B.1
McDermott, L.2
Illahi, T.3
Kechadi, M.4
|