-
1
-
-
0041783510
-
Privacy preserving data mining
-
Dallas, TX, May
-
R. Agrawal and R. Srikant. Privacy preserving data mining. In 2000 ACM SIGMOD, pages 439-450, Dallas, TX, May 2000.
-
(2000)
2000 ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
-
(2005)
ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
3
-
-
84874672882
-
Cost models for future software life cycle processes: COCOMO 2.0
-
B. W. Boehm, B. Clark, E. Horowitz, C. Westland, R. Madachy, and R. Selby. Cost models for future software life cycle processes: COCOMO 2.0. Annals of Software Engineering, 1:57-94, 1995.
-
(1995)
Annals of Software Engineering
, vol.1
, pp. 57-94
-
-
Boehm, B.W.1
Clark, B.2
Horowitz, E.3
Westland, C.4
Madachy, R.5
Selby, R.6
-
6
-
-
70349249358
-
Does enforcing anonymity mean decreasing data usefulness?
-
New York, NY, USA, ACM.
-
G. Canfora and C. A. Visaggio. Does enforcing anonymity mean decreasing data usefulness? In QoP '08: Proceedings of the 4th ACM workshop on Quality of protection, pages 15-22, New York, NY, USA, 2008. ACM.
-
(2008)
QoP '08: Proceedings of the 4th ACM Workshop on Quality of Protection
, pp. 15-22
-
-
Canfora, G.1
Visaggio, C.A.2
-
7
-
-
77953740540
-
A systematic review of software fault prediction studies
-
Press Corrected Proof:-
-
C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Systems with Applications, In Press, Corrected Proof:-, 2008.
-
(2008)
Expert Systems with Applications
-
-
Catal, C.1
Diri, B.2
-
9
-
-
0034245310
-
Quantitative analysis of faults and failures in a complex software system
-
N. E. Fenton and N. Ohlsson. Quantitative analysis of faults and failures in a complex software system. IEEE Trans. on Software Engineering, 26(8):797-814, 2000.
-
(2000)
IEEE Trans. on Software Engineering
, vol.26
, Issue.8
, pp. 797-814
-
-
Fenton, N.E.1
Ohlsson, N.2
-
10
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205-216, 2005.
-
(2005)
ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
13
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99-106, 2003.
-
(2003)
ICDM
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
14
-
-
0036891333
-
Using regression trees to classify fault-prone software modules
-
T. M. Khoshgoftaar, E. B. Allen, and J. Deng. Using regression trees to classify fault-prone software modules. IEEE Trans. on Reliability, 51(4):455-462, 2002.
-
(2002)
IEEE Trans. on Reliability
, vol.51
, Issue.4
, pp. 455-462
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Deng, J.3
-
15
-
-
0000178692
-
Using classiFIcation trees for software quality models: Lessons learned
-
T. M. Khoshgoftaar, E. B. Allen, W. Jones, and J. P. Hudepohl. Using classiFIcation trees for software quality models: Lessons learned. International Journal of Software Engineering and Knowledge Engineering, 9(2):217-232, 1998.
-
(1998)
International Journal of Software Engineering and Knowledge Engineering
, vol.9
, Issue.2
, pp. 217-232
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Jones, W.3
Hudepohl, J.P.4
-
16
-
-
25844463667
-
Comparing high change modules and modules with the highest measurement values in two large-scale open-source products
-
A. G. Koru and J. Tian. Comparing high change modules and modules with the highest measurement values in two large-scale open-source products. IEEE Transactions on Software Engineering, 31(8):625-642, 2005.
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.8
, pp. 625-642
-
-
Koru, A.G.1
Tian, J.2
-
19
-
-
33746873290
-
A tree-based data perturbation approach for privacy-preserving data mining
-
DOI 10.1109/TKDE.2006.136, 1661517
-
X.-B. Li and S. Sarkar. A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. on Knowl. and Data Eng., 18(9):1278-1283, 2006. (Pubitemid 44192193)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.9
, pp. 1278-1283
-
-
Li, X.-B.1
Sarkar, S.2
-
20
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, Georgia, April 2006.
-
22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, Georgia, April 2006
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
22
-
-
0024123707
-
Learning from examples: Generation and evaluation of decision trees for software resource analysis
-
R. W. Selby and A. A. Porter. Learning from examples: Generation and evaluation of decision trees for software resource analysis. IEEE Trans. on Software Engineering, 14(12):1743-1757, 1988.
-
(1988)
IEEE Trans. on Software Engineering
, vol.14
, Issue.12
, pp. 1743-1757
-
-
Selby, R.W.1
Porter, A.A.2
-
29
-
-
0032027010
-
Analyzing and improving reliability: A tree based approach
-
J. Tian and J. Palma. Analyzing and improving reliability: A tree based approach. IEEE Software, 15(2):97-104, 1998.
-
(1998)
IEEE Software
, vol.15
, Issue.2
, pp. 97-104
-
-
Tian, J.1
Palma, J.2
-
30
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
March
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1):50-57, March 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|