-
1
-
-
84990941766
-
-
3rd edition, Morgan Kaufmann
-
J. Han, M. Kamber, J. Pei, Data Mining: Concepts and Techniques, 3rd edition, Morgan Kaufmann, 2011.
-
(2011)
Data Mining: Concepts and Techniques
-
-
Han, J.1
Kamber, M.2
Pei, J.3
-
2
-
-
33846657496
-
-
Springer
-
C. Batini, M. Scannapieco, Data Quality: Concepts, Methodologies and Techniques, Data-Centric Systems and Applications, Springer, 2006.
-
(2006)
Data Quality: Concepts, Methodologies and Techniques, Data-Centric Systems and Applications
-
-
Batini, C.1
Scannapieco, M.2
-
3
-
-
34748823295
-
-
MIT Press
-
Y. Lee, L. Pipino, J. Funk, R. Wang, Journey to Data Quality, MIT Press, 2009.
-
(2009)
Journey to Data Quality
-
-
Lee, Y.1
Pipino, L.2
Funk, J.3
Wang, R.4
-
4
-
-
0002490026
-
Data cleaning: Problems and current approaches
-
E. Rahm, H.H. Do, Data cleaning: problems and current approaches, IEEE Data Engineering Bulletin 23 (4) (2000) 3-13.
-
(2000)
IEEE Data Engineering Bulletin
, vol.23
, Issue.4
, pp. 3-13
-
-
Rahm, E.1
Do, H.H.2
-
5
-
-
78449293191
-
A comparison of personal name matching: Techniques and practical issues
-
Hong Kong
-
P. Christen, A comparison of personal name matching: techniques and practical issues, in: IEEE ICDM Workshop on Mining Complex Data, Hong Kong, 2006.
-
(2006)
IEEE ICDM Workshop on Mining Complex Data
-
-
Christen, P.1
-
7
-
-
67650258952
-
Privacy-preserving data linkage and geocoding: Current approaches and research directions
-
Hong Kong
-
P. Christen, Privacy-preserving data linkage and geocoding: current approaches and research directions, in: IEEE ICDM Workshop on Privacy Aspects of Data Mining, Hong Kong, 2006.
-
(2006)
IEEE ICDM Workshop on Privacy Aspects of Data Mining
-
-
Christen, P.1
-
8
-
-
33845667955
-
Duplicate record detection: A survey
-
DOI 10.1109/TKDE.2007.250581
-
A. Elmagarmid, P. Ipeirotis, V.S. Verykios, Duplicate record detection: a survey, IEEE Transactions on Knowledge and Data Engineering 19 (1) (2007) 1-16. (Pubitemid 44955773)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.1
, pp. 1-16
-
-
Elmagarmid, A.K.1
Ipeirotis, P.G.2
Verykios, V.S.3
-
9
-
-
80053089497
-
-
Springer
-
Z. Bellahsene, A. Bonifati, E. Rahm, Schema Matching and Mapping, Data-Centric Systems and Applications, Springer, 2011.
-
(2011)
Schema Matching and Mapping, Data-Centric Systems and Applications
-
-
Bellahsene, Z.1
Bonifati, A.2
Rahm, E.3
-
11
-
-
84863067746
-
Data fusion: Resolving data conflicts for integration
-
X. Dong, F. Naumann, Data fusion: resolving data conflicts for integration, Proceedings of the VLDB Endowment 2 (2) (2009) 1654-1655.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.2
, pp. 1654-1655
-
-
Dong, X.1
Naumann, F.2
-
14
-
-
80052731396
-
An introduction to duplicate detection
-
F. Naumann, M. Herschel, An introduction to duplicate detection, Synthesis Lectures on Data Management, vol. 2 (1), 2010, pp. 1-87.
-
(2010)
Synthesis Lectures on Data Management
, vol.2
, Issue.1
-
-
Naumann, F.1
Herschel, M.2
-
15
-
-
0013331361
-
Real-world data is dirty: Data cleansing and the merge/purge problem
-
M.A. Hernandez, S.J. Stolfo, Real-world data is dirty: data cleansing and the merge/purge problem, Data Mining and Knowledge Discovery 2 (1) (1998) 9-37. (Pubitemid 128696797)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.1
, pp. 9-37
-
-
Hernandez, M.A.1
Stolfo, S.J.2
-
16
-
-
0242540438
-
Learning to match and cluster large high-dimensional data sets for data integration
-
Edmonton
-
W.W. Cohen, J. Richman, Learning to match and cluster large high-dimensional data sets for data integration, in: ACM SIGKDD, Edmonton, 2002.
-
(2002)
ACM SIGKDD
-
-
Cohen, W.W.1
Richman, J.2
-
17
-
-
5444258997
-
A comparison of fast blocking methods for record linkage
-
Washington, DC
-
R. Baxter, P. Christen, T. Churches, A comparison of fast blocking methods for record linkage, in: ACM SIGKDD Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington, DC, 2003.
-
(2003)
ACM SIGKDD Workshop on Data Cleaning, Record Linkage and Object Consolidation
-
-
Baxter, R.1
Christen, P.2
Churches, T.3
-
18
-
-
33846428121
-
Quality and complexity measures for data linkage and deduplication
-
F. Guillet, H. Hamilton (Eds.), Springer
-
P. Christen, K. Goiser, Quality and complexity measures for data linkage and deduplication, in: F. Guillet, H. Hamilton (Eds.), Quality Measures in Data Mining, Studies in Computational Intelligence, vol. 43, Springer, 2007, pp. 127-151.
-
(2007)
Quality Measures in Data Mining, Studies in Computational Intelligence
, vol.43
, pp. 127-151
-
-
Christen, P.1
Goiser, K.2
-
19
-
-
84920595044
-
A survey of indexing techniques for scalable record linkage and deduplication
-
P. Christen, A survey of indexing techniques for scalable record linkage and deduplication, IEEE Transactions on Knowledge and Data Engineering 24 (9) (2012) 1537-1555.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.9
, pp. 1537-1555
-
-
Christen, P.1
-
20
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
Paris
-
C. Clifton, M. Kantarcioglu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, D. Suciu, Privacy-preserving data integration and sharing, in: ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Paris, 2004, pp. 19-26.
-
(2004)
ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
, pp. 19-26
-
-
Clifton, C.1
Kantarcioglu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
21
-
-
40449103107
-
Public good through data linkage: Measuring research outputs from the Western Australian Data Linkage System
-
DOI 10.1111/j.1753-6405.2008.00160.x
-
E. Brook, D. Rosman, C. Holman, Public good through data linkage: measuring research outputs from the Western Australian data linkage system, Australian and New Zealand Journal of Public Health 32 (1) (2008) 19-23. (Pubitemid 351351015)
-
(2008)
Australian and New Zealand Journal of Public Health
, vol.32
, Issue.1
, pp. 19-23
-
-
Brook, E.L.1
Rosman, D.L.2
Holman, C.D.J.3
-
22
-
-
4344570142
-
Practical introduction to record linkage for injury research
-
DOI 10.1136/ip.2003.004580
-
D.E. Clark, Practical introduction to record linkage for injury research, Injury Prevention 10 (2004) 186-191. (Pubitemid 39186474)
-
(2004)
Injury Prevention
, vol.10
, Issue.3
, pp. 186-191
-
-
Clark, D.E.1
-
23
-
-
0036450652
-
Research use of linked health data - A best practice protocol
-
C.W. Kelman, J. Bass, D. Holman, Research use of linked health data-a best practice protocol, Australian and New Zealand Journal of Public Health 26 (2002) 251-255. (Pubitemid 35446374)
-
(2002)
Australian and New Zealand Journal of Public Health
, vol.26
, Issue.3
, pp. 251-255
-
-
Kelman, C.W.1
Bass, A.J.2
Holman, C.D.J.3
-
25
-
-
84856412670
-
Resilient identity crime detection
-
C. Phua, K. Smith-Miles, V. Lee, R. Gayler, Resilient identity crime detection, IEEE Transactions on Knowledge and Data Engineering 24 (3) (2012) 533-546.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.3
, pp. 533-546
-
-
Phua, C.1
Smith-Miles, K.2
Lee, V.3
Gayler, R.4
-
26
-
-
1942443495
-
Automatically detecting deceptive criminal identities
-
G. Wang, H. Chen, H. Atabakhsh, Automatically detecting deceptive criminal identities, Communications of the ACM 47 (3) (2004) 70-76.
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 70-76
-
-
Wang, G.1
Chen, H.2
Atabakhsh, H.3
-
28
-
-
77955176662
-
Efficient privacy preserving similar document detection
-
M. Murugesan, W. Jiang, C. Clifton, L. Si, J. Vaidya, Efficient privacy preserving similar document detection, International Journal on Very Large Databases 19 (4) (2010) 457-475.
-
(2010)
International Journal on Very Large Databases
, vol.19
, Issue.4
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
29
-
-
84884417241
-
Preparation of name and address data for record linkage using hidden Markov models
-
T. Churches, P. Christen, K. Lim, J.X. Zhu, Preparation of name and address data for record linkage using hidden Markov models, BioMed Central Medical Informatics and Decision Making 2 (9) (2002).
-
(2002)
BioMed Central Medical Informatics and Decision Making
, vol.2
, Issue.9
-
-
Churches, T.1
Christen, P.2
Lim, K.3
Zhu, J.X.4
-
30
-
-
74049138802
-
Development and user experiences of an open source data cleaning, deduplication and record linkage system
-
P. Christen, Development and user experiences of an open source data cleaning, deduplication and record linkage system, SIGKDD Explorations 11 (1) (2009) 39-48.
-
(2009)
SIGKDD Explorations
, vol.11
, Issue.1
, pp. 39-48
-
-
Christen, P.1
-
31
-
-
11144240583
-
A comparison of string distance metrics for name-matching tasks
-
Acapulco
-
W.W. Cohen, P. Ravikumar, S. Fienberg, A comparison of string distance metrics for name-matching tasks, in: IJCAI Workshop on Information Integration on the Web, Acapulco, 2003, pp. 73-78.
-
(2003)
IJCAI Workshop on Information Integration on the Web
, pp. 73-78
-
-
Cohen, W.W.1
Ravikumar, P.2
Fienberg, S.3
-
32
-
-
65449178105
-
Febrl: An open source data cleaning, deduplication and record linkage system with a graphical user interface
-
Las Vegas
-
P. Christen, Febrl: an open source data cleaning, deduplication and record linkage system with a graphical user interface, in: ACM SIGKDD, Las Vegas, 2008, pp. 1065-1068.
-
(2008)
ACM SIGKDD
, pp. 1065-1068
-
-
Christen, P.1
-
33
-
-
37149056535
-
Decision models for record linkage
-
Data Mining: Theory, Methodology, Techniques, and Applications
-
L. Gu, R. Baxter, Decision models for record linkage, in: Selected Papers from AusDM, Lecture Notes in Computer Science, vol. 3755, Springer, 2006, pp. 146-160. (Pubitemid 350253717)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3755
, pp. 146-160
-
-
Gu, L.1
Baxter, R.2
-
34
-
-
2942709772
-
Methods for evaluating and creating data quality
-
W.E. Winkler, Methods for evaluating and creating data quality, Information Systems 29 (7) (2004) 531-550.
-
(2004)
Information Systems
, vol.29
, Issue.7
, pp. 531-550
-
-
Winkler, W.E.1
-
36
-
-
33745266392
-
Domain-independent data cleaning via analysis of entity-relationship graph
-
DOI 10.1145/1138394.1138401
-
D. Kalashnikov, S. Mehrotra, Domain-independent data cleaning via analysis of entity-relationship graph, ACM Transactions on Database Systems 31 (2) (2006) 716-767. (Pubitemid 43924953)
-
(2006)
ACM Transactions on Database Systems
, vol.31
, Issue.2
, pp. 716-767
-
-
Kalashnikov, D.V.1
Mehrotra, S.2
-
37
-
-
0029822648
-
Irreversible encryption method by generation of polynomials
-
C. Quantin, H. Bouzelat, L. Dusserre, Irreversible encryption method by generation of polynomials, Medical Informatics and the Internet in Medicine 21 (2) (1996) 113-121. (Pubitemid 26401860)
-
(1996)
Medical Informatics
, vol.21
, Issue.2
, pp. 113-121
-
-
Quantin, C.1
Bouzelat, H.2
Dusserre, L.3
-
38
-
-
33749384202
-
A toolbox for record linkage
-
R. Schnell, T. Bachteler, S. Bender, A toolbox for record linkage, Austrian Journal of Statistics 33 (1-2) (2004) 125-133.
-
(2004)
Austrian Journal of Statistics
, vol.33
, Issue.1-2
, pp. 125-133
-
-
Schnell, R.1
Bachteler, T.2
Bender, S.3
-
39
-
-
47949115568
-
On the use of semantic blocking techniques for data cleansing and integration
-
Banff, Canada
-
J. Nin, V. Muntes-Mulero, N. Martinez-Bazan, J.-L. Larriba-Pey, On the use of semantic blocking techniques for data cleansing and integration, in: IDEAS, Banff, Canada, 2007, pp. 190-198.
-
(2007)
IDEAS
, pp. 190-198
-
-
Nin, J.1
Muntes-Mulero, V.2
Martinez-Bazan, N.3
Larriba-Pey, J.-L.4
-
40
-
-
84943425383
-
Efficient record linkage in large data sets
-
Tokyo
-
L. Jin, C. Li, S. Mehrotra, Efficient record linkage in large data sets, in: DASFAA, Tokyo, 2003, pp. 137-146.
-
(2003)
DASFAA
, pp. 137-146
-
-
Jin, L.1
Li, C.2
Mehrotra, S.3
-
41
-
-
84976856849
-
The merge/purge problem for large databases
-
San Jose
-
M.A. Hernandez, S.J. Stolfo, The merge/purge problem for large databases, in: ACM SIGMOD, San Jose, 1995, pp. 127-138.
-
(1995)
ACM SIGMOD
, pp. 127-138
-
-
Hernandez, M.A.1
Stolfo, S.J.2
-
42
-
-
33845363891
-
A fast linkage detection scheme for multi-source information integration
-
DOI 10.1109/WIRI.2005.2, 1552993, Proceedings - International Workshop on Challenges in Web Information Retrieval and Integration, WIRI'05
-
A. Aizawa, K. Oyama, A fast linkage detection scheme for multi-source information integration, in: WIRI, Tokyo, 2005, pp. 30-39. (Pubitemid 44883138)
-
(2005)
Proceedings - International Workshop on Challenges in Web Information Retrieval and Integration, WIRI'05
, vol.2005
, pp. 30-39
-
-
Aizawa, A.1
Oyama, K.2
-
43
-
-
79952543891
-
Robust record linkage blocking using suffix arrays and Bloom filters
-
T. de Vries, H. Ke, S. Chawla, P. Christen, Robust record linkage blocking using suffix arrays and Bloom filters, ACM Transactions on Knowledge Discovery from Data 5 (2) (2011).
-
(2011)
ACM Transactions on Knowledge Discovery from Data
, vol.5
, Issue.2
-
-
De Vries, T.1
Ke, H.2
Chawla, S.3
Christen, P.4
-
44
-
-
0034592784
-
Efficient clustering of high-dimensional data sets with application to reference matching
-
Boston
-
A. McCallum, K. Nigam, L.H. Ungar, Efficient clustering of high-dimensional data sets with application to reference matching, in: ACM SIGKDD, Boston, 2000, pp. 169-178.
-
(2000)
ACM SIGKDD
, pp. 169-178
-
-
McCallum, A.1
Nigam, K.2
Ungar, L.H.3
-
45
-
-
84976659284
-
Approximate string matching
-
P. Hall, G. Dowling, Approximate string matching, ACM Computing Surveys 12 (4) (1980) 381-402.
-
(1980)
ACM Computing Surveys
, vol.12
, Issue.4
, pp. 381-402
-
-
Hall, P.1
Dowling, G.2
-
46
-
-
0030412523
-
A comparison of approximate string matching algorithms
-
P. Jokinen, J. Tarhio, E. Ukkonen, A comparison of approximate string matching algorithms, Software-Practice and Experience 26 (12) (1996) 1439-1458. (Pubitemid 126598523)
-
(1996)
Software - Practice and Experience
, vol.26
, Issue.12
, pp. 1439-1458
-
-
Jokinen, P.1
Tarhio, J.2
Ukkonen, E.3
-
47
-
-
0345566149
-
A guided tour to approximate string matching
-
G. Navarro, A guided tour to approximate string matching, ACM Computing Surveys 33 (1) (2001) 31-88. (Pubitemid 33768480)
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.1
, pp. 31-88
-
-
Navarro, G.1
-
49
-
-
0142218940
-
Non-adjacent diagrams improve matching of cross-lingual spelling variants
-
Springer
-
H. Keskustalo, A. Pirkola, K. Visala, E. Leppänen, K. Järvelin, Non-adjacent diagrams improve matching of cross-lingual spelling variants, in: String Processing and Information Retrieval, Springer, 2003, pp. 252-265.
-
(2003)
String Processing and Information Retrieval
, pp. 252-265
-
-
Keskustalo, H.1
Pirkola, A.2
Visala, K.3
Leppänen, E.4
Järvelin, K.5
-
50
-
-
0026979939
-
Techniques for automatically correcting words in text
-
DOI 10.1145/146370.146380
-
K. Kukich, Techniques for automatically correcting words in text, ACM Computing Surveys 24 (4) (1992) 377-439. (Pubitemid 23687641)
-
(1992)
ACM Computing Surveys
, vol.24
, Issue.4
, pp. 377-439
-
-
Kukich Karen1
-
51
-
-
79952272717
-
Triphone analysis: A combined method for the correction of orthographical and typographical errors
-
Austin, TX, USA
-
B. van Berkel, K. De Smedt, Triphone analysis: a combined method for the correction of orthographical and typographical errors, in: ANLP, Austin, TX, USA, 1988, pp. 77-83.
-
(1988)
ANLP
, pp. 77-83
-
-
Van Berkel, B.1
De Smedt, K.2
-
52
-
-
84950419860
-
Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida
-
M. Jaro, Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida, Journal of American Statistical Association (1989) 414-420.
-
(1989)
Journal of American Statistical Association
, pp. 414-420
-
-
Jaro, M.1
-
53
-
-
0008976521
-
String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage
-
American Statistical Association
-
W. Winkler, String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, 1990, pp. 778-783.
-
(1990)
Survey Research Methods
, pp. 778-783
-
-
Winkler, W.1
-
54
-
-
2942702984
-
Improved decision rules in the Fellegi-Sunter model of record linkage
-
American Statistical Association
-
W. Winkler, Improved decision rules in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, vol. 274, 1993, p. 279.
-
(1993)
Survey Research Methods
, vol.274
, pp. 279
-
-
Winkler, W.1
-
55
-
-
65449139594
-
Automatic record linkage using seeded nearest neighbour and support vector machine classification
-
Las Vegas
-
P. Christen, Automatic record linkage using seeded nearest neighbour and support vector machine classification, in: ACM SIGKDD, Las Vegas, 2008.
-
(2008)
ACM SIGKDD
-
-
Christen, P.1
-
56
-
-
0000251971
-
Maximum likelihood estimation via the ECM algorithm: A general framework
-
X. Meng, D. Rubin, Maximum likelihood estimation via the ECM algorithm: a general framework, Biometrika 80 (2) (1993) 267.
-
(1993)
Biometrika
, vol.80
, Issue.2
, pp. 267
-
-
Meng, X.1
Rubin, D.2
-
57
-
-
0002940254
-
Using the em algorithm for weight computation in the Fellegi-Sunter model of record linkage
-
American Statistical Association
-
W. Winkler, Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage, in: Survey Research Methods, American Statistical Association, vol. 667, 1988, p. 671.
-
(1988)
Survey Research Methods
, vol.667
, pp. 671
-
-
Winkler, W.1
-
58
-
-
84876208378
-
Near automatic weight computation in the Fellegi-Sunter model of record linkage
-
US Bureau of the Census
-
W. Winkler, Near automatic weight computation in the Fellegi-Sunter model of record linkage, in: Fifth Annual Research Conference, US Bureau of the Census, 1989.
-
(1989)
Fifth Annual Research Conference
-
-
Winkler, W.1
-
59
-
-
0036371278
-
Analysis of identifier performance using a deterministic linkage algorithm
-
S. Grannis, J. Overhage, C. McDonald, Analysis of identifier performance using a deterministic linkage algorithm, in: AMIA Annual Symposium, 2002, p. 305.
-
(2002)
AMIA Annual Symposium
, pp. 305
-
-
Grannis, S.1
Overhage, J.2
McDonald, C.3
-
60
-
-
0000666461
-
Data integration using similarity joins and a word-based information representation language
-
W. Cohen, Data integration using similarity joins and a word-based information representation language, ACM Transactions on Information Systems 18 (3) (2000) 288-321.
-
(2000)
ACM Transactions on Information Systems
, vol.18
, Issue.3
, pp. 288-321
-
-
Cohen, W.1
-
61
-
-
0036203458
-
TAILOR: A record linkage toolbox
-
M.G. Elfeky, V.S. Verykios, A.K. Elmagarmid, TAILOR: a record linkage toolbox, in: IEEE ICDE, San Jose, 2002, pp. 17-28. (Pubitemid 34278693)
-
(2002)
Proceedings - International Conference on Data Engineering
, pp. 17-28
-
-
Elfeky, M.G.1
Verykios, V.S.2
Elmagarmid, A.K.3
-
62
-
-
77952372966
-
Adaptive duplicate detection using learnable string similarity measures
-
Washington, DC
-
M. Bilenko, R.J. Mooney, Adaptive duplicate detection using learnable string similarity measures, in: ACM SIGKDD, Washington, DC, 2003, pp. 39-48.
-
(2003)
ACM SIGKDD
, pp. 39-48
-
-
Bilenko, M.1
Mooney, R.J.2
-
63
-
-
34548725521
-
Group linkage
-
DOI 10.1109/ICDE.2007.367895, 4221698, 23rd International Conference on Data Engineering, ICDE 2007
-
B. On, N. Koudas, D. Lee, D. Srivastava, Group linkage, in: IEEE ICDE, Istanbul, Turkey, 2007, pp. 496-505. (Pubitemid 47422053)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 496-505
-
-
On, B.-W.1
Koudas, N.2
Lee, D.3
Srivastava, D.4
-
64
-
-
84866951187
-
Scalable iterative graph duplicate detection
-
M. Herschel, F. Naumann, S. Szott, M. Taubert, Scalable iterative graph duplicate detection, IEEE Transactions on Knowledge and Data Engineering 24 (11) (2012) 2094-2108.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.11
, pp. 2094-2108
-
-
Herschel, M.1
Naumann, F.2
Szott, S.3
Taubert, M.4
-
65
-
-
0003990972
-
-
2nd edition, Morgan Kaufmann
-
I.H. Witten, A. Moffat, T.C. Bell, Managing Gigabytes, 2nd edition, Morgan Kaufmann, 1999.
-
(1999)
Managing Gigabytes
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
67
-
-
0003612818
-
-
MIT Press
-
C. Manning, H. Schütze, MITCogNet, Foundations of Statistical Natural Language Processing, vol. 59, MIT Press, 1999.
-
(1999)
MITCogNet, Foundations of Statistical Natural Language Processing
, vol.59
-
-
Manning, C.1
Schütze, H.2
-
69
-
-
70349836319
-
Privacy preserving record linkage approaches
-
V.S. Verykios, A. Karakasidis, V. Mitrogiannis, Privacy preserving record linkage approaches, International Journal of Data Mining, Modelling and Management 1 (2) (2009) 206-221.
-
(2009)
International Journal of Data Mining, Modelling and Management
, vol.1
, Issue.2
, pp. 206-221
-
-
Verykios, V.S.1
Karakasidis, A.2
Mitrogiannis, V.3
-
70
-
-
78049382188
-
Privacy-preserving record linkage
-
Corfu, Greece
-
R. Hall, S. Fienberg, Privacy-preserving record linkage, in: Privacy in Statistical Databases, Springer Lecture Notes in Computer Science, vol. 6344, Corfu, Greece, 2010, pp. 269-283.
-
(2010)
Privacy in Statistical Databases, Springer Lecture Notes in Computer Science
, vol.6344
, pp. 269-283
-
-
Hall, R.1
Fienberg, S.2
-
72
-
-
77952259855
-
Blocking-aware private record linkage
-
Baltimore, MD, USA
-
A. Al-Lawati, D. Lee, P. McDaniel, Blocking-aware private record linkage, in: International Workshop on Information Quality in Information Systems, Baltimore, MD, USA, 2005, pp. 59-68.
-
(2005)
International Workshop on Information Quality in Information Systems
, pp. 59-68
-
-
Al-Lawati, A.1
Lee, D.2
McDaniel, P.3
-
73
-
-
84870552185
-
An empirical comparison of approaches to approximate string matching in private record linkage
-
T. Bachteler, R. Schnell, J. Reiher, An empirical comparison of approaches to approximate string matching in private record linkage, in: Statistics Canada Symposium, 2010.
-
(2010)
Statistics Canada Symposium
-
-
Bachteler, T.1
Schnell, R.2
Reiher, J.3
-
74
-
-
52649087713
-
A hybrid approach to private record linkage
-
Cancun, Mexico
-
A. Inan, M. Kantarcioglu, E. Bertino, M. Scannapieco, A hybrid approach to private record linkage, in: IEEE ICDE, Cancun, Mexico, 2008, pp. 496-505.
-
(2008)
IEEE ICDE
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
75
-
-
67649644357
-
Efficient private record linkage
-
Shanghai
-
M. Yakout, M. Atallah, A. Elmagarmid, Efficient private record linkage, in: IEEE ICDE, Shanghai, 2009, pp. 1283-1286.
-
(2009)
IEEE ICDE
, pp. 1283-1286
-
-
Yakout, M.1
Atallah, M.2
Elmagarmid, A.3
-
76
-
-
84863542211
-
A simple heuristic for blindfolded record linkage
-
S. Weber, H. Lowe, A. Das, T. Ferris, A simple heuristic for blindfolded record linkage, Journal of the American Medical Informatics Association 19 (e1) (2012) e157-e161.
-
(2012)
Journal of the American Medical Informatics Association
, vol.19
, Issue.E1
-
-
Weber, S.1
Lowe, H.2
Das, A.3
Ferris, T.4
-
77
-
-
20444470394
-
Privacy-preserving data linkage protocols
-
Washington, DC, USA
-
C. O'Keefe, M. Yung, L. Gu, R. Baxter, Privacy-preserving data linkage protocols, in: ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, 2004, pp. 94-102.
-
(2004)
ACM Workshop on Privacy in the Electronic Society
-
-
O'Keefe, C.1
Yung, M.2
Gu, L.3
Baxter, R.4
-
78
-
-
84861588233
-
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
-
E. Durham, Y. Xue, M. Kantarcioglu, B. Malin, Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage, Information Fusion 13 (4) (2012) 245-259.
-
(2012)
Information Fusion
, vol.13
, Issue.4
, pp. 245-259
-
-
Durham, E.1
Xue, Y.2
Kantarcioglu, M.3
Malin, B.4
-
79
-
-
84870553094
-
Advances in privacy preserving record linkage
-
IGI Global
-
A. Karakasidis, V.S. Verykios, Advances in privacy preserving record linkage, in: E-activity and Innovative Technology, Advances in Applied Intelligence Technologies Book Series, IGI Global, 2010, pp. 22-34.
-
(2010)
E-activity and Innovative Technology, Advances in Applied Intelligence Technologies Book Series
, pp. 22-34
-
-
Karakasidis, A.1
Verykios, V.S.2
-
80
-
-
70349844175
-
Privacy-preserving string comparisons in record linkage systems: A review
-
S. Trepetin, Privacy-preserving string comparisons in record linkage systems: a review, Information Security Journal: A Global Perspective 17 (5) (2008) 253-266.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.5
, pp. 253-266
-
-
Trepetin, S.1
-
81
-
-
67650266675
-
Geocode matching and privacy preservation
-
Las Vegas
-
P. Christen, Geocode matching and privacy preservation, in: KDD Workshop on Privacy, Security, and Trust, Las Vegas, 2009, pp. 7-24.
-
(2009)
KDD Workshop on Privacy, Security, and Trust
-
-
Christen, P.1
-
83
-
-
78049357399
-
Secure multiparty computation for privacy-preserving data mining
-
Y. Lindell, B. Pinkas, Secure multiparty computation for privacy-preserving data mining, Journal of Privacy and Confidentiality 1 (1) (2009) 5.
-
(2009)
Journal of Privacy and Confidentiality
, vol.1
, Issue.1
, pp. 5
-
-
Lindell, Y.1
Pinkas, B.2
-
84
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Y. Lindell, B. Pinkas, An efficient protocol for secure two-party computation in the presence of malicious adversaries, EUROCRYPT (2007) 52-78.
-
(2007)
EUROCRYPT
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
85
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, Security and composition of multiparty cryptographic protocols, Journal of Cryptology 13 (1) (2000) 143-202.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
86
-
-
18144444441
-
A one way public key cryptosystem for the linkage of nominal files in epidemiological studies
-
L. Dusserre, C. Quantin, H. Bouzelat, A one way public key cryptosystem for the linkage of nominal files in epidemiological studies, Medinfo 8 (1995) 644-647.
-
(1995)
Medinfo
, vol.8
, pp. 644-647
-
-
Dusserre, L.1
Quantin, C.2
Bouzelat, H.3
-
87
-
-
0032032036
-
How to ensure data security of an epidemiological follow-up:Quality assessment of an anonymous record linkage procedure
-
DOI 10.1016/S1386-5056(98)00019-7, PII S1386505698000197, Common Security Solutions for Communicating Patient Data
-
C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, L. Dusserre, How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure, International Journal of Medical Informatics 49 (1) (1998) 117-122. (Pubitemid 28353812)
-
(1998)
International Journal of Medical Informatics
, vol.49
, Issue.1
, pp. 117-122
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
88
-
-
0030340494
-
Extraction and anonymity protocol of medical file
-
H. Bouzelat, C. Quantin, L. Dusserre, Extraction and anonymity protocol of medical file, in: AMIA Fall Symposium, 1996, pp. 323-327.
-
(1996)
AMIA Fall Symposium
, pp. 323-327
-
-
Bouzelat, H.1
Quantin, C.2
Dusserre, L.3
-
89
-
-
0031656168
-
Automatic record hash coding and linkage for epidemiological follow-up data confidentiality
-
C. Quantin, H. Bouzelat, F.-A. Allaert, A.-M. Benhamiche, J. Faivre, L. Dusserre, Automatic record hash coding and linkage for epide-miological follow-up data confidentiality, Methods of Information in Medicine 37 (3) (1998) 271-277. (Pubitemid 28450065)
-
(1998)
Methods of Information in Medicine
, vol.37
, Issue.3
, pp. 271-277
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
90
-
-
0003851399
-
-
2nd edition, John Wiley & Sons Inc., New York
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons Inc., New York, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
93
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, M. Zhu, Tools for privacy preserving distributed data mining, SIGKDD Explorations 4 (2) (2002) 28-34.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
95
-
-
0023545076
-
How to play any mental game
-
New York, USA
-
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game, in: 19th Annual ACM Symposium on Theory of Computing, New York, USA, 1987, pp. 218-229.
-
(1987)
19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
96
-
-
1142303699
-
Information sharing across private databases
-
San Diego
-
R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: ACM SIGMOD, San Diego, 2003, pp. 86-97.
-
(2003)
ACM SIGMOD
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
98
-
-
58549089788
-
How to construct pseudo-random permutations from pseudo-random functions
-
M. Luby, C. Rackoff, How to construct pseudo-random permutations from pseudo-random functions, in: CRYPTO, vol. 85, 1986, p. 447.
-
(1986)
CRYPTO
, vol.85
, pp. 447
-
-
Luby, M.1
Rackoff, C.2
-
99
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
100
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
M. Freedman, Y. Ishai, B. Pinkas, O. Reingold, Keyword search and oblivious pseudorandom functions, Theory of Cryptography (2005) 303-324. (Pubitemid 41231171)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
101
-
-
84863589864
-
Fake injection strategies for private phonetic matching
-
Leuven, Belgium
-
A. Karakasidis, V.S. Verykios, P. Christen, Fake injection strategies for private phonetic matching, in: International Workshop on Data Privacy Management, Leuven, Belgium, 2011.
-
(2011)
International Workshop on Data Privacy Management
-
-
Karakasidis, A.1
Verykios, V.S.2
Christen, P.3
-
102
-
-
35448932873
-
Privacy preserving schema and data matching
-
DOI 10.1145/1247480.1247553, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
M. Scannapieco, I. Figotin, E. Bertino, A. Elmagarmid, Privacy preserving schema and data matching, in: ACM SIGMOD, Beijing, China, 2007, pp. 653-664. (Pubitemid 47630842)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
103
-
-
62249167366
-
Privacy-preserving fuzzy matching using a public reference table
-
C. Pang, L. Gu, D. Hansen, A. Maeder, Privacy-preserving fuzzy matching using a public reference table, Intelligent Patient Management (2009) 71-89.
-
(2009)
Intelligent Patient Management
, pp. 71-89
-
-
Pang, C.1
Gu, L.2
Hansen, D.3
Maeder, A.4
-
104
-
-
84870477881
-
An efficient two-party protocol for approximate matching in private record linkage
-
Ballarat, Australia
-
D. Vatsalan, P. Christen, V.S. Verykios, An efficient two-party protocol for approximate matching in private record linkage, in: AusDM, CRPIT, vol. 121, Ballarat, Australia, 2011, pp. 125-136.
-
(2011)
AusDM, CRPIT
, vol.121
, pp. 125-136
-
-
Vatsalan, D.1
Christen, P.2
Verykios, V.S.3
-
106
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, S. Venkatasubramanian, T-closeness: privacy beyond k-anonymity and l-diversity, in: IEEE ICDE, Istanbul, Turkey, 2007, pp. 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
107
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, l-diversity: privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data 1 (1) (2007) 3.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
108
-
-
56749163236
-
A privacy-preserving framework for integrating person-specific databases
-
Springer
-
M. Kantarcioglu, W. Jiang, B. Malin, A privacy-preserving framework for integrating person-specific databases, in: Privacy in Statistical Databases, Springer, 2008, pp. 298-314.
-
(2008)
Privacy in Statistical Databases
, pp. 298-314
-
-
Kantarcioglu, M.1
Jiang, W.2
Malin, B.3
-
109
-
-
79960442271
-
Anonymity meets game theory: Secure data integration with malicious participants
-
N. Mohammed, B. Fung, M. Debbabi, Anonymity meets game theory: secure data integration with malicious participants, International Journal on Very Large Databases 20 (4) (2011) 567-588.
-
(2011)
International Journal on Very Large Databases
, vol.20
, Issue.4
, pp. 567-588
-
-
Mohammed, N.1
Fung, B.2
Debbabi, M.3
-
111
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM 13 (7) (1970) 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
112
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder, M. Mitzenmacher, Network applications of bloom filters: a survey, Internet Mathematics 1 (4) (2004) 485-509.
-
(2004)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
113
-
-
84964941330
-
Private medical record linkage with approximate matching
-
Washington, DC
-
E. Durham, Y. Xue, M. Kantarcioglu, B. Malin, Private medical record linkage with approximate matching, in: AMIA Annual Symposium, Washington, DC, 2010, p. 182.
-
(2010)
AMIA Annual Symposium
, pp. 182
-
-
Durham, E.1
Xue, Y.2
Kantarcioglu, M.3
Malin, B.4
-
116
-
-
66149159225
-
An efficient Bloom filter based solution for multiparty private matching
-
Las Vegas
-
P. Lai, S. Yiu, K. Chow, C. Chong, L. Hui, An efficient Bloom filter based solution for multiparty private matching, in: SAM, Las Vegas, 2006, p. 7.
-
(2006)
SAM
, pp. 7
-
-
Lai, P.1
Yiu, S.2
Chow, K.3
Chong, C.4
Hui, L.5
-
117
-
-
84962835282
-
An iterative two-party protocol for scalable privacy-preserving record linkage
-
Sydney, Australia
-
D. Vatsalan, P. Christen, An iterative two-party protocol for scalable privacy-preserving record linkage, in: AusDM, CRPIT, vol. 134, Sydney, Australia, 2012.
-
(2012)
AusDM, CRPIT
, vol.134
-
-
Vatsalan, D.1
Christen, P.2
-
118
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Florida, USA
-
H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: IEEE ICDM, Florida, USA, 2003, pp. 99-106.
-
(2003)
IEEE ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
119
-
-
77952279809
-
Private record matching using differential privacy
-
Lausanne, Switzerland
-
A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, Private record matching using differential privacy, in: EDBT, Lausanne, Switzerland, 2010, pp. 123-134.
-
(2010)
EDBT
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
122
-
-
79961178764
-
A constraint satisfaction cryptanalysis of Bloom filters in private record linkage
-
Springer
-
M. Kuzu, M. Kantarcioglu, E. Durham, B. Malin, A constraint satisfaction cryptanalysis of Bloom filters in private record linkage, in: Privacy Enhancing Technologies, Springer, 2011, pp. 226-245.
-
(2011)
Privacy Enhancing Technologies
, pp. 226-245
-
-
Kuzu, M.1
Kantarcioglu, M.2
Durham, E.3
Malin, B.4
-
123
-
-
0003685012
-
-
University of Illinois Press, Urbana
-
C. Shannon, W. Weaver, The Mathematical Theory of Communication, vol. 19, University of Illinois Press, Urbana, 1962.
-
(1962)
The Mathematical Theory of Communication
, vol.19
-
-
Shannon, C.1
Weaver, W.2
-
124
-
-
67650700151
-
Accurate synthetic generation of realistic personal information
-
Springer, Bangkok, Thailand
-
P. Christen, A. Pudjijono, Accurate synthetic generation of realistic personal information, in: PAKDD, Lecture Notes in Artificial Intelligence, vol. 5476, Springer, Bangkok, Thailand, 2009, pp. 507-514.
-
(2009)
PAKDD, Lecture Notes in Artificial Intelligence
, vol.5476
, pp. 507-514
-
-
Christen, P.1
Pudjijono, A.2
-
125
-
-
34249878982
-
A parallel general-purpose synthetic data generator
-
J. Hoag, C. Thompson, A parallel general-purpose synthetic data generator, ACM SIGMOD 36 (1) (2007) 19-24.
-
(2007)
ACM SIGMOD
, vol.36
, Issue.1
, pp. 19-24
-
-
Hoag, J.1
Thompson, C.2
-
126
-
-
0034431889
-
Evaluation of the encryption procedure and record linkage in the Belgian national cancer registry
-
E. Van Eycken, K. Haustermans, F. Buntinx, A. Ceuppens, J. Weyler, E. Wauters, O. Van, et al., Evaluation of the encryption procedure and record linkage in the Belgian National Cancer Registry, Archives of Public Health 58 (6) (2000) 281-294. (Pubitemid 32798834)
-
(2000)
Archives of Public Health
, vol.58
, Issue.6
, pp. 281-294
-
-
Van Eycken, E.1
Haustermans, K.2
Buntinx, F.3
Ceuppens, A.4
Weyler, J.5
Wauters, E.6
Van Oyen, H.7
De Schaever, M.8
Van Den Berge, D.9
Haelterman, M.10
-
127
-
-
70449677016
-
Protocols for secure remote database access with approximate matching
-
Springer
-
W. Du, M. Atallah, Protocols for secure remote database access with approximate matching, in: E-Commerce Security and Privacy, Springer, 2001.
-
(2001)
E-Commerce Security and Privacy
-
-
Du, W.1
Atallah, M.2
-
129
-
-
1642327704
-
Secure and private sequence comparisons
-
ACM, Washington, DC, USA
-
M. Atallah, F. Kerschbaum, W. Du, Secure and private sequence comparisons, in: Workshop on Privacy in the Electronic Society, ACM, Washington, DC, USA, 2003.
-
(2003)
Workshop on Privacy in the Electronic Society
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
130
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
Brighton, UK
-
P. Ravikumar, W. Cohen, S. Fienberg, A secure protocol for computing string distance metrics, in: Workshop on Privacy and Security Aspects of Data Mining held at IEEE ICDM, Brighton, UK, 2004.
-
(2004)
Workshop on Privacy and Security Aspects of Data Mining Held at IEEE ICDM
-
-
Ravikumar, P.1
Cohen, W.2
Fienberg, S.3
-
131
-
-
79961178919
-
Privacy preserving group linkage
-
Springer
-
F. Li, Y. Chen, B. Luo, D. Lee, P. Liu, Privacy preserving group linkage, in: Scientific and Statistical Database Management, Springer, 2011, pp. 432-450.
-
(2011)
Scientific and Statistical Database Management
, pp. 432-450
-
-
Li, F.1
Chen, Y.2
Luo, B.3
Lee, D.4
Liu, P.5
-
133
-
-
0005180705
-
An information-theoretic definition of similarity
-
Madison, WI, USA
-
D. Lin, An information-theoretic definition of similarity, in: ICML, vol. 1, Madison, WI, USA, 1998, pp. 296-304.
-
(1998)
ICML
, vol.1
, pp. 296-304
-
-
Lin, D.1
-
134
-
-
79956028511
-
A privacy preserving efficient protocol for semantic similarity join using long string attributes
-
Sweden
-
B. Hawashin, F. Fotouhi, T. Truta, A privacy preserving efficient protocol for semantic similarity join using long string attributes, in: ACM Workshop on Privacy and Anonymity in the Information Society, Sweden, 2011, p. 6.
-
(2011)
ACM Workshop on Privacy and Anonymity in the Information Society
, pp. 6
-
-
Hawashin, B.1
Fotouhi, F.2
Truta, T.3
-
136
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, S. Dumais, G. Furnas, T. Landauer, R. Harshman, Indexing by latent semantic analysis, Journal of the American Society for Information Science 41 (6) (1990) 391-407.
-
(1990)
Journal of the American Society for Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Furnas, G.3
Landauer, T.4
Harshman, R.5
-
137
-
-
24644513146
-
-
MIT Press, Vancouver, Canada
-
X. He, P. Niyogi, Locality Preserving Projections, vol. 103, MIT Press, Vancouver, Canada, 2004.
-
(2004)
Locality Preserving Projections
, vol.103
-
-
He, X.1
Niyogi, P.2
-
139
-
-
84894038431
-
Approaches to multiple record linkage
-
Dublin, Ireland
-
M. Sadinle, R. Hall, S. Fienberg, Approaches to multiple record linkage, in: International Statistical Institute, Dublin, Ireland, 2011.
-
(2011)
International Statistical Institute
-
-
Sadinle, M.1
Hall, R.2
Fienberg, S.3
-
140
-
-
84880102424
-
Reconstruction from randomized graph via low rank approximation
-
Columbus, Ohio, USA
-
L. Wu, X. Ying, X. Wu, Reconstruction from randomized graph via low rank approximation, in: SIAM, Columbus, Ohio, USA, 2010, pp. 60-71.
-
(2010)
SIAM
, pp. 60-71
-
-
Wu, L.1
Ying, X.2
Wu, X.3
-
141
-
-
41849118008
-
Preserving the privacy of sensitive relationships in graph data
-
Springer-Verlag, San Jose, USA
-
E. Zheleva, L. Getoor, Preserving the privacy of sensitive relationships in graph data, in: 1st ACM SIGKDD Workshop on Privacy, Security, and Trust, Springer-Verlag, San Jose, USA, 2007, pp. 153-171.
-
(2007)
1st ACM SIGKDD Workshop on Privacy, Security, and Trust
, pp. 153-171
-
-
Zheleva, E.1
Getoor, L.2
-
143
-
-
84892966962
-
A privacy-preserving framework for accuracy and completeness quality assessment
-
D. Barone, A. Maurino, F. Stella, C. Batini, A privacy-preserving framework for accuracy and completeness quality assessment, Emerging Paradigms in Informatics, Systems and Communication (2009) 83.
-
(2009)
Emerging Paradigms in Informatics, Systems and Communication
, pp. 83
-
-
Barone, D.1
Maurino, A.2
Stella, F.3
Batini, C.4
|