-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS, pages 247-255, 2001.
-
(2001)
PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
70349146546
-
Type-based categorization of relational attributes
-
B. Ahmadi, M. Hadjieleftheriou, T. Seidl, D. Srivastava, and S. Venkatasubramanian. Type-based categorization of relational attributes. In EDBT, pages 84-95, 2009.
-
(2009)
EDBT
, pp. 84-95
-
-
Ahmadi, B.1
Hadjieleftheriou, M.2
Seidl, T.3
Srivastava, D.4
Venkatasubramanian, S.5
-
3
-
-
3142664804
-
Information-theoretic tools for mining database structure from large data sets
-
P. Andritsos, R. J. Miller, and P. Tsaparas. Information-theoretic tools for mining database structure from large data sets. In SIGMOD, pages 731-742, 2004.
-
(2004)
SIGMOD
, pp. 731-742
-
-
Andritsos, P.1
Miller, R.J.2
Tsaparas, P.3
-
4
-
-
35048857464
-
LIMBO: Scalable clustering of categorical data
-
P. Andritsos, P. Tsaparas, R. Miller, and K. Sevcik. LIMBO: scalable clustering of categorical data. In EDBT, pages 123-146, 2004.
-
(2004)
EDBT
, pp. 123-146
-
-
Andritsos, P.1
Tsaparas, P.2
Miller, R.3
Sevcik, K.4
-
5
-
-
1142287643
-
An information-theoretic approach to normal forms for relational and xml data
-
M. Arenas and L. Libkin. An information-theoretic approach to normal forms for relational and xml data. In PODS, pages 15-26, 2003.
-
(2003)
PODS
, pp. 15-26
-
-
Arenas, M.1
Libkin, L.2
-
6
-
-
27844528478
-
An information-theoretic approach to normal forms for relational and xml data
-
M. Arenas and L. Libkin. An information-theoretic approach to normal forms for relational and xml data. J. ACM, 52(2):246-283, 2005.
-
(2005)
J. ACM
, vol.52
, Issue.2
, pp. 246-283
-
-
Arenas, M.1
Libkin, L.2
-
7
-
-
84969151029
-
A near-optimal algorithm for computing the entropy of a stream
-
A. Chakrabarti, G. Cormode, and A. McGregor. A near-optimal algorithm for computing the entropy of a stream. In SODA, pages 328-335, 2007.
-
(2007)
SODA
, pp. 328-335
-
-
Chakrabarti, A.1
Cormode, G.2
McGregor, A.3
-
8
-
-
52649168832
-
Rapid identification of column heterogeneity
-
B. T. Dai, N. Koudas, B. C. Ooi, D. Srivastava, and S. Venkatasubramanian. Rapid identification of column heterogeneity. In ICDM, pages 159-170, 2006.
-
(2006)
ICDM
, pp. 159-170
-
-
Dai, B.T.1
Koudas, N.2
Ooi, B.C.3
Srivastava, D.4
Venkatasubramanian, S.5
-
9
-
-
52749083110
-
Validating multi-column schema matchings by type
-
B. T. Dai, N. Koudas, D. Srivastava, A. K. H. Tung, and S. Venkatasubramanian. Validating multi-column schema matchings by type. In ICDE, pages 120-129, 2008.
-
(2008)
ICDE
, pp. 120-129
-
-
Dai, B.T.1
Koudas, N.2
Srivastava, D.3
Tung, A.K.H.4
Venkatasubramanian, S.5
-
10
-
-
0033726311
-
Information dependencies
-
M. M. Dalkilic and E. L. Roberston. Information dependencies. In PODS, pages 245-253, 2000.
-
(2000)
PODS
, pp. 245-253
-
-
Dalkilic, M.M.1
Roberston, E.L.2
-
11
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimevski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222, 2003.
-
(2003)
PODS
, pp. 211-222
-
-
Evfimevski, A.1
Gehrke, J.2
Srikant, R.3
-
12
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In KDD, pages 217-228, 2002.
-
(2002)
KDD
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
13
-
-
1142267348
-
On schema matching with opaque column names and data values
-
J. Kang and J. F. Naughton. On schema matching with opaque column names and data values. In SIGMOD, pages 205-216, 2003.
-
(2003)
SIGMOD
, pp. 205-216
-
-
Kang, J.1
Naughton, J.F.2
-
14
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publishing
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern. Worst-case background knowledge for privacy-preserving data publishing. In ICDE, pages 126-135, 2007.
-
(2007)
ICDE
, pp. 126-135
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
15
-
-
0001808038
-
The information bottleneck method
-
N. Tishby, F. Pereira, and W. Bialek. The information bottleneck method. In Proc. 37-th Annual Allerton Conference on Communication, Control and Computing, pages 368-377, 1999.
-
(1999)
Proc. 37-th Annual Allerton Conference on Communication, Control and Computing
, pp. 368-377
-
-
Tishby, N.1
Pereira, F.2
Bialek, W.3
|