nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conceptual view on trajectories
|
Spaccapietra, Stefano |
|
2008 |
65 |
1 |
p. 126-146 21 p. |
artikel |
2 |
A MaxMin approach for hiding frequent itemsets
|
Moustakides, George V. |
|
2008 |
65 |
1 |
p. 75-89 15 p. |
artikel |
3 |
Augmenting the power of LSI in text retrieval: Singular value rescaling
|
Yan, Hua |
|
2008 |
65 |
1 |
p. 108-125 18 p. |
artikel |
4 |
Discovering frequent itemsets by support approximation and itemset clustering
|
Jea, Kuen-Fang |
|
2008 |
65 |
1 |
p. 90-107 18 p. |
artikel |
5 |
IFC - Editorial Board
|
|
|
2008 |
65 |
1 |
p. IFC- 1 p. |
artikel |
6 |
Optimizing lock protocols for native XML processing
|
Haustein, Michael |
|
2008 |
65 |
1 |
p. 147-173 27 p. |
artikel |
7 |
Privacy-preserving imputation of missing data
|
Jagannathan, Geetha |
|
2008 |
65 |
1 |
p. 40-56 17 p. |
artikel |
8 |
Recent advances in preserving privacy when mining data
|
Bonchi, Francesco |
|
2008 |
65 |
1 |
p. 1-4 4 p. |
artikel |
9 |
The applicability of the perturbation based privacy preserving data mining for real-world data
|
Liu, Li |
|
2008 |
65 |
1 |
p. 5-21 17 p. |
artikel |
10 |
Towards optimal k-anonymization
|
Li, Tiancheng |
|
2008 |
65 |
1 |
p. 22-39 18 p. |
artikel |
11 |
Transforming semi-honest protocols to ensure accountability
|
Jiang, Wei |
|
2008 |
65 |
1 |
p. 57-74 18 p. |
artikel |