ERA users may experience an intermittent Deposit/Save error. We apologize for any inconvenience this may cause. Thank you for your patience while we work to resolve the issue. When the work is completed, we'll remove this notice.
SearchSkip to Search Results
- 3Database Systems
- 1Artifactual Patterns
- 1Collection Fusion
- 1Data Mining and Privacy
- 1Data Sanitization
- 1Data security
Technical report TR02-11. Various query languages have been proposed for XML, some inspired by database query languages (e.g. SQL and OQL) and others introduced by documents community. To fulfill its role of a standardization body,W3C has identified a number of requirements for XML query...
Technical report TR02-13. Discovering hidden patterns from large amounts of data plays an important role in marketing, business, medical analysis, and other applications where these patterns are paramount for strategic decision making. However, recent research has shown that some discovered...
A Unified Framework for Searching Multiple Compressed Collections
Technical report TR01-17. In this work, we propose a new framework for searching directly through multiple compressed collections. We combine, in a single framework, four techniques for efficient, low-overhead text retrieval: inverted index compression, block addressing, sequential searching in...
An Efficient One-Scan Sanitization For Improving The Balance Between Privacy And Knowledge DiscoveryDownload
Technical report TR03-15. In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To...
Technical report TR04-17. Preserving privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying attribute values subjected to clustering without jeopardizing the similarity between data objects under analysis. To address this...
Technical report TR02-01. Research in information hiding has grown explosively. A large number of techniques have been proposed to discourage copyright infringement, tampering and unauthorized distribution of digital media (e.g. video, audio, and images). In this paper, we provide an overview of...
Technical report TR03-12. Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security, intellectual property rights, and many others. In this paper, we address the privacy problem...