Consumer Data and Privacy in Ubiquitous Computing
暂无分享,去创建一个
[1] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[2] John Riedl,et al. E-Commerce Recommendation Applications , 2004, Data Mining and Knowledge Discovery.
[3] Dimitris K. Tasoulis,et al. Privacy Preserving Unsupervised Clustering over Vertically Partitioned Data , 2006, ICCSA.
[4] Mervi Toivari,et al. Engineering the pentose phosphate pathway of Saccharomyces cerevisiae for production of ethanol and xylitol , 2007 .
[5] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[8] Matthias Klusch,et al. Inference on Distributed Data Clustering , 2005, MLDM.
[9] J. Leppänen. Development of a New Monte Carlo reactor physics code , 2007 .
[10] Chris Clifton,et al. Privacy-preserving clustering with distributed EM mixture modeling , 2004, Knowledge and Information Systems.
[11] Lambèr M. M. Royakkers,et al. Ethical issues in web data mining , 2004, Ethics and Information Technology.
[12] Martin Natter,et al. Collaborative filtering or regression models for Internet recommendation systems? , 2002 .
[13] Alfred Kobsa,et al. Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.
[14] Flavia Sparacino. Narrative Spaces: bridging architecture and entertainment via interactive technology , 2002 .
[15] Mikhail J. Atallah,et al. Private collaborative forecasting and benchmarking , 2004, WPES '04.
[16] Chris Clifton,et al. Defining Privacy for Data Mining , 2002 .
[17] Mikhail J. Atallah,et al. Privacy preserving route planning , 2004, WPES '04.
[18] Maria Halkidi,et al. An Introduction to Quality Assessment in Data Mining , 2002 .
[19] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Paul S. Bradley,et al. Refining Initial Points for K-Means Clustering , 1998, ICML.
[21] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[22] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[23] Arja Laitila,et al. Microbes in the tailoring of barley malt properties , 2007 .
[24] Rebecca N. Wright,et al. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.
[25] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[26] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[27] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[28] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[29] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[30] Jan Saijets,et al. VTT PUBLICATIONS 644 MOSFET RF Characterization Using Bulk and SOI CMOS Technologies , 2007 .
[31] B. Thuraisingham. Privacy-Preserving Data Mining : Developments and Directions , 2004 .
[32] Stanley R. M. Oliveira,et al. Toward Standardization in Privacy-Preserving Data Mining , 2004 .
[33] LindenGreg,et al. Amazon.com Recommendations , 2003 .
[34] J. Rubenfeld. The Right of Privacy , 1989 .
[35] Kimmo Solehmainen,et al. Fabrication of microphotonic waveguide components on silicon , 2007 .
[36] Elisa Bertino,et al. A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.
[37] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[38] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[39] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[40] Bhavani M. Thuraisingham,et al. Privacy-Preserving Data Mining: Development and Directions , 2005, J. Database Manag..
[41] O. Günther,et al. Privacy conflicts in CRM services for online shops: a case study , 2002 .
[42] Dino Pedreschi,et al. Towards low-perturbation anonymity preserving pattern discovery , 2006, SAC '06.
[43] Harold Davis. Google advertising tools , 2006 .
[44] Kathryn Elliot,et al. Time, Meaning and Ownership: the Value of Location in the Home , 2004 .
[45] Petri Kotiluoto,et al. Adaptive tree multigrids and simplified spherical harmonics approximation in deterministic neutral and charged particle transport , 2007 .
[46] John Thackara,et al. In the Bubble: Designing in a Complex World , 2005 .
[47] Wenliang Du,et al. Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[48] Rene Hexel,et al. User Identity and Ubiquitous Computing: User Selected Pseudonyms , 2005 .
[49] Osmar R. Zaïane,et al. Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..
[50] B. Briscoe,et al. Metcalfe's law is wrong - communications networks increase in value as they add members-but by how much? , 2006, IEEE Spectrum.
[51] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[52] Tsan-sheng Hsu,et al. Preserving confidentiality when sharing medical database with the Cellsecu system , 2003, Int. J. Medical Informatics.
[53] Alexandre V. Evfimievski,et al. Randomization in privacy preserving data mining , 2002, SKDD.
[54] Mark Weiser. The computer for the 21st century , 1991 .
[55] J. Avery,et al. The long tail. , 1995, Journal of the Tennessee Medical Association.
[56] Kalle Lyytinen,et al. Issues and Challenges in Ubiquitous Computing , 2002 .
[57] William J. Mitchell. Narrative Spaces : bridging architecture and entertainment via interactive technology , 2002 .