-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N. R., & Wortmann, J. C. (1989). Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
6
-
-
0029679131
-
Active learning with statistical models
-
Cohn, D. A., Gharamani, Z., & Jordan, M. I. (1996). Active learning with statistical models. Journal of Artificial Intelligence Research, 4, 129-145.
-
(1996)
Journal of Artificial Intelligence Research
, vol.4
, pp. 129-145
-
-
Cohn, D.A.1
Gharamani, Z.2
Jordan, M.I.3
-
9
-
-
35348880974
-
A large-scale evaluation and analysis of personalized search strategies
-
Dou, Z., Song, R., & Wen, J.-R. (2007). A large-scale evaluation and analysis of personalized search strategies. In World Wide Web Conference (WWW).
-
(2007)
World Wide Web Conference (WWW)
-
-
Dou, Z.1
Song, R.2
Wen, J.-R.3
-
10
-
-
78651425042
-
Models of searching and browsing: Languages, studies, and applications
-
Downey, D., Dumais, S., & Horvitz, E. (2007). Models of searching and browsing: Languages, studies, and applications. In International Joint Conference on Artificial Intelligence (IJCAI).
-
(2007)
International Joint Conference on Artificial Intelligence (IJCAI)
-
-
Downey, D.1
Dumais, S.2
Horvitz, E.3
-
13
-
-
0033361588
-
The data-correcting algorithm for the minimization of supermodular functions
-
Goldengorin, B., Sierksma, G., Tijssen, G. A., & Tso, M. (1999). The data-correcting algorithm for the minimization of supermodular functions. Management Science, 45(11), 1539-1551.
-
(1999)
Management Science
, vol.45
, Issue.11
, pp. 1539-1551
-
-
Goldengorin, B.1
Sierksma, G.2
Tijssen, G.A.3
Tso, M.4
-
15
-
-
79960359586
-
Online-information privacy: Measuring the cost-benefit tradeoff
-
Hann, I., Hui, K., Lee, T., & Png, I. (2002). Online-information privacy: Measuring the cost-benefit tradeoff. In International Conference on Information Systems.
-
(2002)
International Conference on Information Systems
-
-
Hann, I.1
Hui, K.2
Lee, T.3
Png, I.4
-
16
-
-
0027556865
-
An approximate nonmyopic computation for value of information
-
Heckerman, D., Horvitz, E., & Middleton, B. (1993). An approximate nonmyopic computation for value of information. IEEE Trans. Pattern Analysis and Machine Intelligence, 15, 292-298.
-
(1993)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.15
, pp. 292-298
-
-
Heckerman, D.1
Horvitz, E.2
Middleton, B.3
-
17
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
Hoeffding, W. (1963). Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301), 13-30.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
18
-
-
70349131769
-
Flexible anonymization for privacy preserving data publishing: A systematic search based approach
-
Hore, B., & R. Jammalamadaka, S. M. (2007). Flexible anonymization for privacy preserving data publishing: A systematic search based approach. In SIAM Conference on Data Mining (SDM).
-
(2007)
SIAM Conference on Data Mining (SDM)
-
-
Hore, B.1
Jammalamadaka S M, R.2
-
21
-
-
0003863029
-
-
chap. Influence Diagrams Strategic Decision Group, Menlo Park. Reprinted 2005 in Decision Analysis 2(3): 127-143
-
Howard, R. A., & Matheson, J. (1984). Readings on the Principles and Applications of Decision Analysis II, chap. Influence Diagrams, pp. 719-762. Strategic Decision Group, Menlo Park. Reprinted 2005 in Decision Analysis 2(3) 127-143.
-
(1984)
Readings on the Principles and Applications of Decision Analysis II
, pp. 719-762
-
-
Howard, R.A.1
Matheson, J.2
-
22
-
-
27644505323
-
Valuating privacy
-
Huberman, B. A., Adar, E., & Fine, L. R. (2005). Valuating privacy. IEEE Security & Privacy, 3(5), 22-25.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
24
-
-
0003500845
-
On the value of private information
-
Kleinberg, J., Papadimitriou, C. H., & Raghavan, P. (2001). On the value of private information. TARK: Theoretical Aspects of Reasoning about Knowledge, 8.
-
(2001)
TARK: Theoretical Aspects of Reasoning about Knowledge
, vol.8
-
-
Kleinberg, J.1
Papadimitriou, C.H.2
Raghavan, P.3
-
28
-
-
78651450125
-
Beyond k-anonymity: A decision theoretic framework for assessing privacy risk
-
Lebanon, G., Scannapieco, M., Fouad, M. R., & Bertino, E. (2009). Beyond k-anonymity: A decision theoretic framework for assessing privacy risk. Transactions on Data Privacy, 2(3), 153-183.
-
(2009)
Transactions on Data Privacy
, vol.2
, Issue.3
, pp. 153-183
-
-
Lebanon, G.1
Scannapieco, M.2
Fouad, M.R.3
Bertino, E.4
-
30
-
-
0001249987
-
On a measure of the information provided by an experiment
-
Lindley, D. V. (1956). On a measure of the information provided by an experiment. Annals of Mathematical Statistics, 27, 986-1005.
-
(1956)
Annals of Mathematical Statistics
, vol.27
, pp. 986-1005
-
-
Lindley, D.V.1
-
31
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2006). L-diversity: Privacy beyond k-anonymity. In IEEE International Conference on Data Engineering (ICDE).
-
(2006)
IEEE International Conference on Data Engineering (ICDE)
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
32
-
-
0000095809
-
An analysis of the approximations for maximizing submodular set functions
-
Nemhauser, G., Wolsey, L., & Fisher, M. (1978). An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, 14, 265-294.
-
(1978)
Mathematical Programming
, vol.14
, pp. 265-294
-
-
Nemhauser, G.1
Wolsey, L.2
Fisher, M.3
-
35
-
-
0005241588
-
An accelerated sequential algorithm for producing D-optimal designs
-
Robertazzi, T. G., & Schwartz, S. C. (1989). An accelerated sequential algorithm for producing D-optimal designs. SIAM Journal of Scientific and Statistical Computing, 10(2), 341-358.
-
(1989)
SIAM Journal of Scientific and Statistical Computing
, vol.10
, Issue.2
, pp. 341-358
-
-
Robertazzi, T.G.1
Schwartz, S.C.2
-
36
-
-
19944401575
-
Adaptive web search based on user profile constructed without any effort from users
-
Sugiyama, K., Hatano, K., & Ikoma, T. (2004). Adaptive web search based on user profile constructed without any effort from users. In World Wide Web Conference (WWW).
-
(2004)
World Wide Web Conference (WWW)
-
-
Sugiyama, K.1
Hatano, K.2
Ikoma, T.3
-
39
-
-
3743095193
-
Selective evidence gathering for diagnostic belief networks
-
van der Gaag, L., & Wessels, M. (1993). Selective evidence gathering for diagnostic belief networks. AISB Quart., 86, 23-34.
-
(1993)
AISB Quart.
, vol.86
, pp. 23-34
-
-
Van Der Gaag, L.1
Wessels, M.2
-
40
-
-
57749173085
-
Examining the personalization-privacy tradeoff an empirical investigation with email advertisements
-
Wattal, S., Telang, R., Mukhopadhyay, T., & Boatwright, P. (2005). Examining the personalization-privacy tradeoff an empirical investigation with email advertisements. Management Science.
-
(2005)
Management Science
-
-
Wattal, S.1
Telang, R.2
Mukhopadhyay, T.3
Boatwright, P.4
|