-
2
-
-
1642298252
-
-
Springer 1st edition
-
G. Alonso, F. Casati, H. Kuno, and V. Machiraju. Web Services: Concepts, Architectures and Applications. Springer, 1st edition, 2010.
-
(2010)
Web Services: Concepts, Architectures and Applications.
-
-
Alonso, G.1
Casati, F.2
Kuno, H.3
Machiraju, V.4
-
3
-
-
84906811054
-
An efficient association rule mining model for distributed databases
-
A. Anitha, G. R. Suhanantham, and N. Krishnan. An efficient association rule mining model for distributed databases. International Journal of Computer Science and Technology, 3(1):794-797, 2002.
-
(2002)
International Journal of Computer Science and Technology
, vol.3
, Issue.1
, pp. 794-797
-
-
Anitha, A.1
Suhanantham, G.R.2
Krishnan, N.3
-
5
-
-
2942735553
-
Odam: An optimized distributed association rule mining algorithm
-
Online
-
M. Z. Ashrafi, D. Taniar, and K. Smith. Odam: an optimized distributed association rule mining algorithm. IEEE Distributed Systems Online, 5, 2004.
-
(2004)
IEEE Distributed Systems
, vol.5
-
-
Ashrafi, M.Z.1
Taniar, D.2
Smith, K.3
-
7
-
-
0030387678
-
A fast distributed algorithm for mining association rules
-
D. W. Cheung, J. Han, V. T. Ng, A. W. Fu, and Y. Fu. A fast distributed algorithm for mining association rules. In Proceedings of the 4th International Conference on on Parallel and Distributed Information Systems (DIS), pages 31-43, 1996.
-
(1996)
Proceedings of the 4th International Conference on on Parallel and Distributed Information Systems (DIS)
, pp. 31-43
-
-
Cheung, D.W.1
Han, J.2
Ng, V.T.3
Fu, A.W.4
Fu, Y.5
-
10
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
(TKDE) May
-
B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711-725, May 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
11
-
-
84880569901
-
Privacy-preserving mining of association rules from outsourced transaction databases
-
F. Giannotti, L. Lakshmanan, A. Monreale, D. Pedreschi, and H. Wang. Privacy-preserving mining of association rules from outsourced transaction databases. IEEE Systems Journal, 7(3):385-395, Sept 2013.
-
(2013)
IEEE Systems Journal
, vol.7
, Issue.3
, pp. 385-395
-
-
Giannotti, F.1
Lakshmanan, L.2
Monreale, A.3
Pedreschi, D.4
Wang, H.5
-
12
-
-
84906818098
-
High-dimensional confidential data mash up using service- oriented architecture
-
April
-
P. Gurunathan, N. Ishwarya, V. Sridevi, C. Nandhini, and S. Deepalakshmi. High-dimensional confidential data mash up using service- oriented architecture. International Journal of Emerging Science and Engineering (IJESE), 1(6), April 2013.
-
(2013)
International Journal of Emerging Science and Engineering(IJESE)
, vol.1
, Issue.6
-
-
Gurunathan, P.1
Ishwarya, N.2
Sridevi, V.3
Nandhini, C.4
Deepalakshmi, S.5
-
14
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Sept.
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026-1037, Sept. 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
15
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
16
-
-
80052663001
-
Differentially private data release for data mining
-
August
-
N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 493-501, August 2011.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
17
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
June
-
N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Anonymizing healthcare data: A case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285-1294, June 2009.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.4
-
23
-
-
10944270172
-
Privacy-preserving data mining: Why, how, and when
-
Nov
-
J. Vaidya and C. Clifton. Privacy-preserving data mining: why, how, and when. IEEE Security Privacy, 2(6): 19-27, Nov 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.6
, pp. 19-27
-
-
Vaidya, J.1
Clifton, C.2
-
24
-
-
85011072055
-
Security in outsourcing of association rule mining
-
W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis. Security in outsourcing of association rule mining. In Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB), pages 111-122, 2007.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB)
, pp. 111-122
-
-
Wong, W.K.1
Cheung, D.W.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
|