Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
ΕΠΙΣΤΗΜΟΝΙΚΕΣ ΔΗΜΟΣΙΕΥΣΕΙΣ ΜΕΤΑΦΡΑΣΗ ΒΙΒΛΙΟΥ 1. M.H. Dunham, Data Mining Introductory and Advanced Topics. Prentice Hall (Μετάφραση από Β. Βερύκιο και Γ. Θεοδωρίδη – Εκδόσεις Νέες Τεχνολογίες) ΚΕΦΑΛΑΙΑ ΣΕ ΒΙΒΛΙΑ 1. Verykios, V.S., and Elmagarmid, A.K., The Purdue University Data Quality Project. In R. Wang, M. Ziad and Y. Lee, Eds., Data Quality, Chapter 8, pp. 119-137, Kluwer Academic Publishers, 2001. 2. Houstis, E.N., Verykios, V.S., Catlin, A.C., Ramakrishnan, N., and Rice, J. R. A Data Mining Environment for Modeling the Performance of Scientific Software. In E.N. Houstis, S. Gallopoulos, J.R. Rice and R. Bramley, Eds., Enabling Technologies for Computational Science: Frameworks, Middleware and Environments, Chapter 21, pp. 261-271, Kluwer Academic Publishers, 2000. ΔΗΜΟΣΙΕΥΣΕΙΣ ΣΕ ΠΕΡΙΟΔΙΚΑ 1. Verykios, V.S., Elmagarmid, A.K., Bertino, E., Dasseni, E., and Saygin, Y., Association Rule Hiding. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 4, pp. 434-447, April 2004. Citations 1. 2. 3. 4. 5. C. Aggarwal, J. Pei, and B. Zhang. On Privacy Preservation against Adversarial Data Mining. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06), Philadelphia, PA, USA, August 20-23, 2006 view Anbumani, K., Nedunchezhian, R. Rapid Privacy Preserving Algorithm for Large Databases. International Journal of Intelligent Information Technologies, Vol. 2, Issue 1, 2006 Chen, X., Orlowska, M. and Li X. A New Framework for Privacy Preserving Data Sharing. In Proceedings of IEEE 4th International Conference on Data Mining ICDM04 Workshop: Privacy and Security Aspects of Data Mining, Brighton, UK, (2004) view Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh. To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. 61-72. SIGMOD 2005 view Xiao-Bai Li and Sarkar, S. A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining. IEEE Transactions on Knowledge and Data Engineering, Vol. 18, Issue. 9, pp. 1278- 1283, September 2006 view 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering, January 2006 (Vol. 18, No. 1) pp. 92-106 view S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis, Department of Computer Science, University of Helsinki, May 2005 view Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004: 219-229 view Juggapong Natwichai, Xue Li, Maria E. Orlowska. Hiding Classification Rules for Data Sharing with Privacy Preservation. DaWaK 2005, pp. 468-477 view Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc. of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. COMPSAC (1) 2005 : 511-516 view K. Wang, B. C. M. Fung, and P. S. Yu. Template-Based Privacy Preservation in Classification Problems. In Proc. of the 5th IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping Attacker's Confidence: An Alternative to kAnonymization. Invited paper, to appear in Knowledge and Information Systems: An International Journal, 2006, Springer-Verlag view Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules. 2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA, August 15-17, 2005 R. Wong, J. Li, A. Fu, K. Wang. (alpha,k)-Anonymity: An Enhanced k-Anonymity Model for PrivacyPreserving Data Publishing. Proceedings of the twelfth ACM SIGKDD international conference on knowledge discovery and data mining (KDD), 2006 view 2. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., and Theodoridis, Y., State of the Art in Privacy Preserving Data Mining. SIGMOD Record, vol. 33, no. 1, pp. 5057, March 2004. Citations 18. 19. 20. 21. 22. 23. 24. 25. 26. N. Anciaux, H.J.W. van Heerde, L. Feng, P.M.G. Apers. Implanting Life-Cycle Privacy Policies in a Context Database. CTIT Technical reports, ISSN 1381-3625, University of Twente, 2006 view Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi. k-Anonymous Patterns. PKDD 2005: 10-21 view Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. k-Anonymous Patterns. 2005-TR17 (technical report) 2005-05-11 view Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern Discovery. Technical Report. May 2006 view George Binto, Anna Valeva. A Database Security Course on a Shoestring. SIGCSE 2006 Technical Symposium on Computer Science Education, Houston, Texas USA March 1-5, 2006 view Justin Brickell, Vitaly Shmatikov. Privacy-Preserving Graph Algorithms in the Semi-Honest Model. In Proc. of Advances in Cryptology - ASIACRYPT 2005, Chennai (Madras), India, December 2005, vol. 3788 of Lecture Notes in Computer Science, pp. 236-252. Springer, 2005 view R. Chen, C. Giannella, K. Sivakumar, and H. Kargupta. Distributed Data Mining for Earth and Space Science Applications. In Proceedings of the NASA Earth Science Technology Conference, 2004 view Chen, X., Orlowska, M. and Li X. A New Framework for Privacy Preserving Data Sharing. In Proceedings of IEEE 4th International Conference on Data Mining ICDM04 Workshop: Privacy and Security Aspects of Data Mining, Brighton, UK, (2004) view Chitti, L. Xiong, L. Liu. Mining Multiple Private Databases using a Privacy Preserving kNN Classifier. Available as technical report, College of Computing, Georgia Institute of Technology, 2004 view 2 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. Sebastien Gambs. Balazs Kegl. Esma Aımeur. Privacy-Preserving Boosting. In proc. Data Mining and Knowledge Discovery, April 2005 view Peter Christen. Privacy-Preserving Data Linkage and Geocoding: Current Approaches and Research Directions. In Workshop on Privacy Aspects of Data Mining held at the ICDM: IEEE International Conference on Data Mining , Hong Kong, December 2006 view A. Friedman, R. Wolff, and A. Schuster. Providing k-Anonymity in Data Mining. Accepted for Journal of VLDB, 2006 view D. Frankowski, D. Cosley, S. Sen, L. Terveen, J, Riedl. You are what you say: privacy risks of public mentions. Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval, 2006 view J. Han and M. Kamber. Data Mining: Concepts and Techniques. 2nd edition, Elsevier Inc. 2006 view S. K. Lam, D. Frankowski, J. Riedl. Do You Trust Your Recommendations? An Exploration Of Security and Privacy Issues in Recommender Systems. In Proceedings of the 2006 International Conference on Emerging Trends in Information and Communication Security (ETRICS), Freiburg, Germany, 2006 view Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering, January 2006 (Vol. 18, No. 1) pp. 92-106 view S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view Alain Mille. Traces Based Reasoning (TBR) Definition, illustration and echoes with story telling. Rapport de recherche RR-LIRIS-2006-002, 2006 view Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis, Department of Computer Science, University of Helsinki, May 2005 view Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004: 219-229 view Mungamuru, B. and Garcia-Molina, H. Beyond Just Data Privacy. InfoLab technical report. Stanford University, July 2006 view Mungamuru, B., Garcia-Molina, H., and Mitra, S. How to Safeguard Your Sensitive Data. InfoLab technical report. Stanford University, April 2006 view Mungamuru, B., Garcia-Molina, H. and Olston, C. Configurations: Understanding Alternatives For Safeguarding Data. InfoLab technical report. Stanford University, July 2006 view Juggapong Natwichai, Xue Li, Maria E. Orlowska. Hiding Classification Rules for Data Sharing with Privacy Preservation. DaWaK 2005, pp. 468-477 view Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view Matthew Roughan and Yin Zhang. Secure distributed data-mining and its application to large-scale network measurements. ACM SIGCOMM Computer Communication, Volume 36 , Issue 1, pp 7-14, January 2006 view Matthew Roughan and Yin Zhang. Privacy-Preserving Performance Measurements. In Proceedings of ACM SIGCOMM Workshop on Mining Network Data (MineNet 2006), Pisa, Italy, September 2006 view Vidar Evenrud Seeberg. Filtering real data for IDS benchmarking. MSc Project Plan at Gjøvik University College (Høgskolen i Gjøvik), Norway, December 2005 view J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents. Engineering Applications of Artificial Intelligence, 2005 view Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc. of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view Tuovinen L., Roning J. Balance of power: the social-ethical aspect of data mining. In Proc of Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), July 17-19, Enschede, the Netherlands view Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu, Yunhe Pan. DHAI: Dynamic Hierarchical AgentBased Infrastructure for Supporting Large-Scale Distributed Information Processing . ICCNMC 2005: 873-882 Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules. 2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA, August 15-17, 2005 Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan. Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining. International Conference on Computational Science (3) 2005: 1020-1023 3 52. 53. 54. 55. 56. 57. 58. Chai Wah Wu. Privacy preserving data mining with unidirectional interaction. ISCAS 2005 - IEEE International Symposium on Circuits and Systems. IEEE, December 2004 view Ming-Jun Xiao, Liu-Sheng Huang, Yong-Long Luo, Hong Shen. Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. PDCAT 2005: 239-243 Li Xiong, Subramanyam Chitti, Ling Liu. Top Queries across Multiple Private Databases. In Proc of 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) pp. 145-154 view Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang. Data Distortion for Privacy Protection in a Terrorist Analysis System. ISI 2005: 459-464, Atlanta, Georgia, USA H. Yu, J. Vaidya & X. Jiang. Privacy-Preserving SVM Classification on Vertically Partitioned Data. Lecture Notes in Computer Science - Pacific-Asia Conf. on Knowledge Discovery and Data Mining, Springer, 2006 view Peng Zhang , Yunhai Tong , Shiwei Tang, Dongqing Yang. Privacy Preserving Naive Bayes Classification. ADMA 2005 : 744-752 Nan Zhang and Wei Zhao. On the Privacy Protection in Information Sharing. tamu-cs-tr-2004-121(technical report) view 3. Verykios, V.S., Moustakides, G.V., and Elfeky, M.G., A Bayesian Decision Model for Cost Optimal Record Matching. The VLDB Journal, vol. 12, no. 1, pp. 28-40, May 2003. Citations 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. Aizawa,Akiko, Oyama,Keizo, Takasu,Atsuhiro, Adachi,Jun. Record Linkage of Multi-source Databases: Research Trends. NII Journal, No.8, pp. 43-51, 2004 view Rohan Baxter, Peter Christen and Tim Churches. A Comparison of Fast Blocking Methods for Record Linkage. Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington DC, August 2003 view Benjelloun, Omar; Garcia-Molina, Hector; Kawai, Hideki; Larson, Tait; Menestrina, David; Thavisomboon, Sutthipong. D-Swoosh: A Family of Algorithms for Generic, Distributed Entity Resolution. technical report, March 2006 view L. Gu, R. Baxter, D. Vickers, and C. Rainsford. Record linkage: Current practice and future directions. Technical Report 03/83, CSIRO Mathematical and Information Sciences, Canberra, Australia, April 2003 view L. Berti-Iquille. Cost of Low-Quality Data Over Association Rules Discovery. International Symposium on Applied Stochastic Models and Data Analysis (AMSDA 2005), Brest, France, May 2005 view Mikhail Bilenko, Sugato Basu, and Mehran Sahami. Adaptive Product Normalization: Using Online Learning for Record Linkage in Comparison Shopping. In Proc. of the 5th International Conference on Data Mining (ICDM-2005), November 2005 view Zhaoqi Chen, Dmitri V. Kalashnikov and Sharad Mehrotra. Exploiting relationships for object consolidation. In ACM IQIS, June 13-17, 2005 view Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed K. Elmagarmid, Dan Suciu. Privacy-preserving data integration and sharing. DMKD 2004: 19-26 view Dmitri Kalashnikov and Sharad Mehrotra. A probabilistic model for entity disambiguation using relationships. Technical Report, TR-RESCUE-04-12, Jun 1, 2004 view Dmitri Kalashnikov and Sharad Mehrotra. Learning importance of relationships for reference disambiguation. Technical Report, 2004-12 view Dmitri V. Kalashnikov and Sharad Mehrotra. Domain-independent data cleaning via analysis of entityrelationship graph. In ACM Transactions on Database Systems (ACM TODS), June 2006 view Dmitri V. Kalashnikov, Zhaoqi Chen, and Sharad Mehrotra. RelDC: domain-independent data cleaning utilizing relationships. TR-RESCUE-04-20, Sep 22, 2004 view Dmitri V. Kalashnikov, Sharad Mehrotra, Zhaoqi Chen. Exploiting Relationships for Domain-Independent Data Cleaning. SDM 2005 view DV. Kalashnikov, S. Mehrotra, and S.Chen. Exploiting Relationships for Data Cleaning. UCI-ICS-TR-0411, May 19, 2004 view Malik, Choudhry Muhammad Zaki. Enforcing Trade Secrets among Competitors on the Semantic Web. Master's Thesis, 2004-08-18 view David Menestrina, Omar Benjelloun, Hector Garcia-Molina. Generic Entity Resolution with Data Confidences. CleanDB 2006 view Diego Milano, Monica Scannapieco, Tiziana Catarci. Structure Aware XML Object Identification. CleanDB 2006 view 4 4. Missier, P., Lalk, G., Verykios, V.S., Grillo, F., Lorusso, T., and Angeletti, P. Improving Data Quality in Practice: A Case Study in the Italian Public Administration. Distributed and Parallel Databases Journal, vol. 13, issue 2, pp. 135-160, March 2003. Citations 76. 77. 5. Elisa Bertino and Ravi Sandhu. Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Sec. Comput. 2(1): 2-19, 2005 view Leif Skiftenes Flak , Stig Nordheim. Stakeholders, Contradictions and Salience: An Empirical Study of a Norwegian G2G Effort. In Proceedings of 39th Hawaii International International Conference on Systems Science (HICSS), 2006 view Houstis, E.N., Rice, J.R., Catlin, A.C., Dhanjani, N., Ramakrishnan, N., Verykios, V.S. MyPYTHIA: A Recommendation Portal for Scientific Software and Services. Concurrency and Computation: Practice and Experience, vol. 14, issue 13-15, pp. 1481-1505, November-December 2002. Citations 78. 79. 80. 81. 6. Michael S. Crocker, Scott S. Hampton, Thierry Matthey, Jesús A. Izaguirre. MDS IM Aid: Automatic parameter optimization in fast electrostatic algorithm. Journal of Computational Chemistry, Volume 26, Issue 10 , Pages 1021 - 1031, May 2005 view G. Fox, D. Gannon, and M. Thomas. Editorial: A Summary of Grid Computing Environments, Concurrency and Computation: Practice and Experience. Vol. 14, No. 13-15, pp. 1035-1044 (2002) view Fox, G., Pierce, M., Gannon, D., Thomas, M. Overview of Grid Computing Environments. Technical Report GGF-GCE-OVERVIEW2, GGF (2003) view Sibylle Schupp, Marcin Zalewski, Kyle Ross. Rapid performance prediction for library components. WOSP 2004: 69-73 view Saygin, Y., Verykios, V.S., Clifton, C.W. Using Unknowns to Prevent Discovery of Association Rules. SIGMOD Record, vol. 30, no. 4, pp. 45-54, December 2001. Citations 82. 83. 84. 85. 86. 87. 88. 89. Shipra Agrawal. High Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004 view Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE 2005: 193-204 view Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern Discovery. Technical Report. May 2006 view Liwu Chang, Ira S. Moskowitz. A Study of Inference Problems in Distributed Databases. DBSec 2002: 191204 view Liwu Chang and James Tracy. Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods. ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Dec, 2002, Maebashi, Japan, pp 195-200 view T. Johnsten, R. Sweeney, V. Raghavan. A Methodology for Hiding Knowledge in XML Document Collections. In Proceedings of COMPSAC-2003 Workshop on Web & Security Informatics, Dallas, TX, Nov 2003 view Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen. Hiding Sensitive Patterns in Association Rules Mining. COMPSAC 2004: 424-429 view 5 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. 111. 7. Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering, January 2006 (Vol. 18, No. 1) pp. 92-106 view S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis, Department of Computer Science, University of Helsinki, May 2005 view Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004: 219-229 view Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view T. Johnsten, V. Raghavan. A Methodology for Hiding Knowledge in Databases. In Proceedings of ICDM02 Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, 2002 view Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM 2003: 613-616 view S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in Association Rule Mining. IDEAS 2003: 54-65 view Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent Patterns. TR02-13, Jun 2002 (technical report) view Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton, C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003, (technical report) view Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287, Volume 1 - Issue 3, 2006 view Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693 view J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents. Engineering Applications of Artificial Intelligence, 2005 view Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc. of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules. 2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA, August 15-17, 2005 Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari. Hiding sensitive items in privacy preserving association rule mining. SMC (4) 2004: 3239-3244 Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach, California, USA html Verykios, V.S., Houstis, E.N., Tsoukala, L.H., and Pantazopoulos, K.N. Automating the Analysis of Option Pricing Algorithms through Intelligent Knowledge Acquisition Approaches. IEEE Transactions on Systems, Man and Cybernetics. Part A, vol. 31, issue 6, pp. 573-586, November 2001. 6 Citations 112. Nurminen, Jukka K. Modelling and Implementation Issues in Circuit and Network Planning Tools. Master thesis, 2003 view 8. Verykios, V.S., Elmagarmid, A.K., and Houstis, E.N. Automating the Approximate Record Matching Process. Journal of Information Sciences, vol. 126, issue 1-4, pp. 83-98, July 2000. Citations 113. Akiko Aizawa , Keizo Oyama. A Fast Linkage Detection Scheme for Multi-Source Information Integration. WIRI 2005 : 30-39 view 114. Christen, Peter and Churches, Tim (2002). Febrl - Freely extensible biomedical record linkage. Technical 115. 116. 117. 118. 119. 120. Report Computer Science Technical Reports no.TR-CS-02-05, Department of Computer Science, FEIT, ANU view Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view Peter Christen, Justin Xi Zhu, Markus Hegland, Stephen Roberts, Ole M. Nielsen, Tim Churches and Kim Lim. High-Performance Computing Techniques for Record Linkage. In Proceedings of the Australian Health Outcomes Conference (AHOC-2002), Canberra, July 2002 view Martin Doerr, Manos Papagelis. A method for estimating the precision of place name matching. International journal of Digital Libraries, 2004 view Ruggles, S. Linking Historical Censuses: A New Approach. Presented at the International Microdata Access Group, Montreal, Novermber 10-11, 2003 view G.A. Wang , J. Xu, H. Chen. Using Social Contextual Information to Match Criminal Identities. In Proceedings of Hawaii International Conference on System Sciences (HICSS-39), Kauai, HI, USA, January 47, 2006 view Huimin Zhao, Sudha Ram. Entity identification for heterogeneous database integration--a multiple classifier system approach and empirical evaluation . Inf. Syst. 30(2): 119-132 (2005) view 9. Verykios, V.S., Houstis, E.N. and Rice, J.R. A Knowledge Discovery Methodology for the Performance Evaluation of Scientific Software. Journal of Neural, Parallel & Scientific Computations, vol. 8, no. 2, pp. 115-132, June 2000. 10. Houstis, E.N., Catlin, A.C., Rice, J.R., Verykios, V.S., Ramakrishnan, N., and Houstis, C.E. PYTHIA-II: A Knowledge/Database System for Managing Performance Data and Recommending Scientific Software. ACM Transactions on Mathematical Software, vol. 26, no. 2, pp. 227-253, June 2000. Citations 121. Aktas, M., M. Pierce, G. Fox, and D. Leake. A Web based Conversational Case-Based Recommender System for Ontology Aided Metadata Discovery. November 8, Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing (GRID 2004), 2004 view 122. Bettig, B., Sandu, C., Joshi, A., and Birru, K.. Dynamic Solver Selection for an Internet Simulation Backbone. Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, March 913, 2003 view 123. P. Bora, C. J. Ribbens, S. Prabhakar, G. Swaminathan, M. Chinnusamy, A. Jeyakumar and B. Diaz-Acosta. Issues in Runtime Algorithm Selection for Grid Environments. in Proceedings of the International Workshop on Challenges of Large Applications in Distributed Environments, I. Banicescu (ed.), IEEE Press, Los Alamitos, CA, 2003, pp 80-87 view 7 124. Michael S. Crocker, Scott S. Hampton, Thierry Matthey, Jesús A. Izaguirre. MDS IM Aid: Automatic 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. parameter optimization in fast electrostatic algorithm. Journal of Computational Chemistry, Volume 26, Issue 10 , Pages 1021 - 1031, May 2005 view H. Guo. A Bayesian Approach for Automatic Algorithm Selection. IJCAI03 Workshop on AI and Autonomic Computing: Developing a Research Agenda for Self-Managing Computer Systems, 2003 view H. Guo and W. Hsu. A Machine Learning Approach to Algorithm Selection for NP-hard Optimization Problems. Submitted to Annals of Operations Research, Special Issue on "Stochastic Search Algorithms", 2005 view Farthing, M.W., D.R. Sassen, J.F. Prins, and C.T. Miller (2004). A problem solving environment for subsurface flow and transport phenomena. XV International Conference on Computational Methods in Water Resources, Chapel Hill, NC, 13-17 June 2004, In press: Volume 2, Edited by: C.T. Miller, M.W. Farthing, W.G. Gray, and G.F. Pinder, Elsevier Science, Amsterdam, The Netherlands view Karen L. Karavanic, John May, Kathryn Mohror, Brian Miller, Kevin Huck, Rashawn Knapp, Brian Pugh. Integrating Database Technology with Comparison-based Parallel Performance Diagnosis: The PerfTrack Performance Experiment Management Tool. The SC 2005 Conference, IEEE/ACM, Seattle, Nov. 2005 view Shu Jiang. An Experiment Management Component for the WBCSim Problem Solving Environment. Master's Thesis, 2002-12-13 J. G. Michopoulos, C. Farhat and J. Fish. Survey on Modeling and Simulation of Multiphysics Systems. Journal of Computing and Information Science in Engineering, Volume 5, Issue 3, pp. 198-213 (2005) view R. J. Mooney, P. Melville, L. R. Tang, J. Shavlik, I. C. Dutra, D. Page, V. S. Costa. Relational Data Mining with Inductive Logic Programming for Link Discovery. In Hillol Kargupta, Anupam Joshi, K. Sivakumar, Yelena Yesha, editors, Data Mining: Next Generation Challenges and Future Directions. AAAI/MIT Press, 2003 view Nurminen, Jukka K. Modelling and Implementation Issues in Circuit and Network Planning Tools. Master thesis, 2003 view Y. S. Ong, 2002, Thesis: Artificial Intelligence Technologies in Complex Engineering Design view C. J. Ribbens, D. Kafura, A. Karnik and M. Lorch. The Virginia Tech Computational Grid: A Research Agenda. Virginia Tech Department of Computer Science Report TR-02-31, 2002 view R. Vuduc, J.W. Demmel, J. Bilmes. Statistical models for empirical search-based performance tuning. International Journal of High-Performance Computing Applications, 18 (1), pp. 65-94, February 2004 view Wallin, Dan. Methods for Creating and Exploiting Data Locality. Doctoral thesis. Uppsala University, Teknisk-naturvetenskapliga vetenskapsområdet, Mathematics and Computer Science, Department of Information Technology. April 2006 view Wilson, David C., Leake, David B., and Bramley, Randall. (2000). Case-Based Recommender Components for Scientific Problem-Solving Environments. Proceedings of the Sixteenth International Association for Mathematics and Computers in Simulation World Congress view ΔΗΜΟΣΙΕΥΣΕΙΣ ΣΕ ΔΙΕΘΝΗ ΣΥΝΕΔΡΙΑ και ΗΜΕΡΙΔΕΣ 1. Pontikakis E.D., Tsitsonis, A. Verykios, V.S. An Experimental Study of Distortion-based Techniques for Association Rule Hiding. To appear in IFIP WG 11.3 Working Conference on Data and Applications Security, July 2004, Sitges, Spain. Citations 138. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180 (2005) view 139. Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287, Volume 1 - Issue 3, 2006 view 8 2. Pontikakis E.D., Verykios, V.S., Theodoridis Y. On the Comparison of Association Rule Hiding Heuristics. In the Proceedings of 3rd Hellenic Data Management Symposium, HDMS 2004, June 2004, Athens, Hellas. Citations 140. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180 (2005) view 3. Verykios, V.S., Moustakides, G.V. A Generalized Cost Optimal Model for Record Matching. In Proceedings of IQIS 2004, International Workshop of Information Quality in Information Systems (SIGMOD 2004 Workshop) , June 2004, Paris, France. 4. Pontikakis E.D., Verykios, V.S. An Experimental Study of Association Rule Hiding Techniques, DIMACS/PORTIA Workshop in Privacy Preserving Data Mining, March 2004, Rutgers University, New Jersey, USA. Citations 141. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180 (2005) view 5. Pfoser, D., Tryfona, N., Verykios, V.S. Service-Based Data Management in a Global Computing Environment. In Proceedings of the 3rd International Workshop on Web and Wireless Geographical Information Systems (W2GIS) December 13, 2003, Rome, Italy. Citations 142. Chara Skouteli, Christoforos Panayiotou, George Samaras, Evaggelia Pitoura. Communities: ConceptBased Querying for Mobile Services. Global Computing 2004: 59-76 view 6. Elfeky, M.G., Verykios, V.S. On Search Enhancement of the Record Linkage Process. In Proceedings of the KDD 2003 Workshop on Data Cleaning, Record Linkage and Object Consolidation, August 2003, Washington, DC, USA. Citations 143. Zhaoqi Chen, Dmitri V. Kalashnikov and Sharad Mehrotra. Exploiting relationships for object consolidation. In ACM IQIS, June 13-17, 2005 view 7. Houstis, E.N., Verykios, V.S., Catlin, A.C., Rice, J.R. A Knowledge Discovery Methodology for Behavior Analysis of Large-Scale Applications on Parallel Architectures. In Proceedings of International Conference on Computational Science, pp. 739-748, June 2003, Melbourne, Australia. 9 8. Saygin, Y., Verykios, V.S., Elmagarmid, A.K. Privacy Preserving Association Rule Mining. In Proceedings of 12th International Workshop on Research Issues in Data Engineering (RIDE 2002), pp. 151-158, San Jose, CA, USA. Citations 144. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004 view 145. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE 2005: 193-204 view 146. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view 147. Seunghyun Im , Zbigniew W. Ras. Ensuring Data Security Against Knowledge Discovery in Distributed Information Systems. RSFDGrC (2) 2005 : 548-557 148. E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view 149. Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693 view 150. J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents. Engineering Applications of Artificial Intelligence, 2005 view 151. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view 152. Slavkovic, A.B. Statistical Disclosure Limitation with Released Marginal and Conditionals for Contingency Tables. Proceedings of Workshop on Privacy and Security Aspects of Data Mining ICDM '04, 2004 view 153. Chen Zi-Yang, Liu Guo-Hua. Quantitative Association Rules Mining Methods with Privacy-preserving. PDCAT 2005: 910-912 9. Elfeky, M.G., Verykios, V.S., Elmagarmid, A.K. TAILOR: A Record Linkage Toolbox. In Proceedings of 18th International Conference on Data Engineering (ICDE 2002), pp. 17-28, San Jose, CA, USA. Citations 154. Aizawa,Akiko, Oyama,Keizo, Takasu,Atsuhiro, Adachi,Jun. Record Linkage of Multi-source Databases: Research Trends. NII Journal, No.8, pp. 43-51, 2004 view 155. Rohan Baxter, Peter Christen and Tim Churches. A Comparison of Fast Blocking Methods for Record 156. 157. 158. 159. 160. 161. 162. Linkage. Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington DC, August 2003 view L. Berti-Iquille. Cost of Low-Quality Data Over Association Rules Discovery. International Symposium on Applied Stochastic Models and Data Analysis (AMSDA 2005), Brest, France, May 2005 view Indrajit Bhattacharya, Lise Getoor. Iterative Record Linkage for Cleaning and Integration. 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Paris, FR, June 2004 view Alexander Bilke, Felix Naumann. Schema Matching Using Duplicates. 21 st International Conference on Data Engineering (ICDE'05), pp 69-80 view Philip Bohannon, Michael Flaster, Wenfei Fan, Rajeev Rastogi. A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification. SIGMOD Conference 2005: 143-154 view Cameron, M. A. and Taylor, K. First-order patterns for information integration. In Lowe, D. and Gaedke, M., eds. Web Engineering: 5th International Conference (ICWE 2005); Sydney, NSW. Springer; 2005: 173184 Cameron, M., Taylor, K. and Baxter, R. (2004). Web service composition and record linking. VLDB Workshop on Information Integration on the Web, IIWeb 2004, Toronto, Canada Peter Christen. Privacy-Preserving Data Linkage and Geocoding: Current Approaches and Research Directions. In Workshop on Privacy Aspects of Data Mining held at the ICDM: IEEE International Conference on Data Mining , Hong Kong, December 2006 view 10 163. Peter Christen. Probabilistic Data Generation for Deduplication and Data Linkage. In Proceedings of the 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. the Sixth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'05), Brisbane, July 2005 view Peter Christen and Tim Churches. A Probabilistic Deduplication, Record Linkage and Geocoding System. In Proceedings of the ARC Health Data Mining workshop, University of South Australia, April 2005 view Peter Christen, Tim Churches , Markus Hegland. A Parallel Open Source Data Linkage System. In the Proc of The Eighth Pacific-Asia Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004 view Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view Peter Christen and Karl Goiser. Towards Automated Data Linkage and Deduplication. Tech report, AustralianNational University, 2005 view Peter Christen and Karl Goiser. Quality and Complexity Measures for Data Linkage and Deduplication. Submitted chapter for the book Quality Measures in Data Mining, July 2005 view Peter Christen and Karl Goiser. Assessing Deduplication and Data Linkage Quality: What to Measure?. Proceedings of the fourth Australasian Data Mining Conference (AusDM 2005), Sydney, December 2005 view Gu,L., Baxter,R. Adaptive Filtering for Efficient Record Linkage. In the proc of 2004 SIAM Int. Conf. on Data Mining, April 22-24, Orlando, Florida view L. Gu, R. Baxter, D. Vickers, and C. Rainsford. Record linkage: Current practice and future directions. Technical Report 03/83, CSIRO Mathematical and Information Sciences, Canberra, Australia, April 2003 view Liang Jin , Chen Li , Sharad Mehrotra. Efficient Record Linkage in Large Data Sets. Proceedings of the Eighth International Conference on Database Systems for Advanced Applications, p.137, March 26-28, 2003 view DV. Kalashnikov, S. Mehrotra, and S.Chen. Exploiting Relationships for Data Cleaning. UCI-ICS-TR-0411, May 19, 2004 view Li, S., Belapurkar, A., Ganiz, M., Janneck, C. J., Wu, T. and Pottenger, W. M. Mining Higher-Order Association Rules from Distributed Named Entity Databases. In the Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Philadelphia, PA, August 2006. (Submitted) view Shenzhi Li, Christopher D. Janneck, Xiaoning Yang, Aditya Belapurkar, Osama A. Khan, Tianhao Wu, Murat Ganiz, Mark D. Dilsizian and William M. Pottenger. Distributed Higher Order Text Mining. Lehigh University, technical report, 2006 view Malin, B. Betrayed by My Shadow: Learning Data Identity via Trail Matching. Journal of Privacy Technology. 2005 view Brandley Malin. Trail Re-identification and Unlinkability in Distributed Databases. CMU-ISRI-06-10, Institute for Software Research, International School of Computer Science, Carnegie Mellon University, May 2006 view Martin, T.P. and Y. Shen. Improving access to multimedia using multi-source hierarchical meta-data. AMR 2005 - Adaptive Multimedia Retrieval 2005, Springer view Matthew Michelson and Craig A. Knoblock. Learning Blocking Schemes for Record Linkage. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI-06), Boston, MA, 2006 view P Missier, S Embury, M Greenwood, A Preece & B Jin. Quality views: Capturing and Exploiting the User Perspective on Data Quality. In Proc 32nd International Conference on Very Large Data Bases (VLDB 2006), pages to appear, 2006 view P Missier, A Oliaro, & S Raffa. Practical Data Quality Certification: Model, Architecture, and Experiences. Proc 3rd International ACM SIGMOD Workshop on Information Quality in Information Systems (IQIS 2006), 2006 view Paolo Missier, Suzanne M. Embury. Provider issues in quality-constrained data provisioning. IQIS 2005: 5-15 view Mattis Neiling. Identification of Real-world Objects in Multiple Databases. In Proc. of GfKl Conference 2005, Magdeburg. March 9-11, 2005 view Taylor, O'Keefe, Colton, Baxter, Sparks, Srinivasan, Cameron & Lefort. A Service Oriented Architecture for a Health Research Data Network. In Proceedings of the 19th International Conference on Scientific and Statistical Database Management 21-23 June 2004 Santorini Island Greece view M. Scannapieco, P. Missier, C. Batini. Data Quality at a Glance. Datenbank-Spektrum 14, August 2005 Widom, J. Trio: a system for integrated management of data, accuracy, and lineage. Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, Calif., USA, 4-7 January 2005 view Winkler, W. E. Data cleaning methods. In Proceedings of the KDD-2003 Workshop on Data Cleaning, Record Linkage, and Object Consolidation (Washington, DC, 2003), pp. 1-6 view 11 10. Dasseni, E., Verykios, V.S., Elmagarmid, A.K., and Bertino, E. Hiding Association Rules by Using Confidence and Support. In Proceedings of 4th International Hiding Workshop (IHW 2001) pp. 369-383, April 2001, Pittsburgh, PA, USA (Lecture Notes in Computer Science 2137 Springer 2001). Citations 188. Aybar C. Acar, Amihai Motro. Why Is this User Asking so Many Questions? Explaining Sequences of Queries. DBSec 2004: 159-176 view 189. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004 view 190. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE 2005: 193-204 view 191. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view 192. Ashrafi, M.Z., Taniar, D., and Smith, K.A. PPDAM: Privacy Preserving Distributed Association Rule Mining 193. 194. 195. 196. 197. 198. 199. 200. 201. 202. 203. 204. 205. 206. 207. 208. 209. Algorithm. International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 49-69, Jan-Mar 2005 view Ashrafi, M Z, Taniar, D & Smith, K.A. Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining. Lecture Notes in Computer Science , vol. 2973, no. 1, pp. 381-392, 2004 Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern Discovery. Technical Report. May 2006 view S. Datta, H Kargupta, K. Sivakumar. Homeland Defense, Privacy-Sensitive Data Mining, and Random Value Distortion. In Proceedings of the SIAM Workshop on Data Mining for Counter Terrorism and Security (SDM'03),San Francisco, CA, May 2003 view T. Johnsten, V. Raghavan. A Methodology for Hiding Knowledge in Databases. In Proceedings of ICDM02 Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, 2002 view T. Johnsten, R. Sweeney, V. Raghavan. A Methodology for Hiding Knowledge in XML Document Collections. In Proceedings of COMPSAC-2003 Workshop on Web & Security Informatics, Dallas, TX, Nov 2003 view E.C. Laskari, G.C. Meletiou, D.K. Tasoulis and M.N. Vrahatis. Data Mining and Cryptology. International Conference of Computational Methods in Sciences and Enginnering 2003 (ICCMSE 2003), pp. 346-349, 2003 S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM 2003: 613-616 view Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in Association Rule Mining. IDEAS 2003: 54-65 view Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton, C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003 view Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent Patterns. TR02-13, Jun 2002 (technical report) view Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287, Volume 1 - Issue 3, 2006 view Stanley R. M. Oliveira, Osmar R. Zaïane, Yücel Saygin. Secure Association Rule Sharing. PAKDD 2004: 74-85 view Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693 view J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents. Engineering Applications of Artificial Intelligence, 2005 view 12 210. Josenildo Costa da Silva, Matthias Klusch. Inference on Distributed Data Clustering. MLDM 2005: 610-619 211. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view 212. Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc. 213. 214. 215. 216. 217. of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. COMPSAC (1) 2005 : 511-516 view Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules. 2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA, August 15-17, 2005 Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari. Hiding sensitive items in privacy preserving association rule mining. SMC (4) 2004: 3239-3244 Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach, California, USA html 11. Verykios, V.S., Moustakides, G.V. A Decision Model for Cost Optimal Record Matching, In Proceedings of Affiliates Workshop on Data Quality, pp. 8, December 2000, Morristown, NJ, USA. 12. Verykios, V.S., Elmagarmid, A.K., Elfeky, M., Cochinwala, M., and Dalal, S. On the Completeness and Accuracy of the Record Matching Process. In Proceedings of the MIT Conference on Information Quality, pp. 54-69, October 2000, Boston, MA, USA. Citations 218. Peter Christen, Tim Churches , Markus Hegland. A Parallel Open Source Data Linkage System. In the Proc of The Eighth Pacific-Asia Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004 view 219. Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view 13. Verykios, V.S., Houstis, E.N., and Rice, J.R. Mining the Performance of Complex Systems. In Proceedings of IEEE International Conference on Intelligence, Information and Systems (ICIIS’99), pp. 606-612, November 1999, Bethesda, MD, USA. 14. Atallah, M., Bertino, E., Elmagarmid, A.K., Ibrahim, M., and Verykios, V.S. Disclosure Limitation of Sensitive Rules. In Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop (KDEX’99) pp. 45-52, November 1999, Chicago, IL, USA. Citations 220. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004 view 221. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE 2005: 193-204 view 13 222. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view 223. Anbumani, K., Nedunchezhian, R. Rapid Privacy Preserving Algorithm for Large Databases. International Journal of Intelligent Information Technologies, Vol. 2, Issue 1, 2006 224. Ashrafi, M Z, Taniar, D & Smith, K.A. Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining. Lecture Notes in Computer Science , vol. 2973, no. 1, pp. 381-392, 2004 225. Ashrafi, M.Z., Taniar, D., and Smith, K.A. PPDAM: Privacy Preserving Distributed Association Rule Mining 226. 227. 228. 229. 230. 231. 232. 233. 234. 235. 236. 237. 238. 239. 240. 241. 242. 243. 244. 245. 246. 247. Algorithm. International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 49-69, Jan-Mar 2005 view Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern Discovery. Technical Report. May 2006 view Chris Clifton. Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security 8(4): (2000) view C. Clifton, M. Kantarcioglu, and J. Vaidya. Defining privacy for data mining. In H. Kargupta, A. Joshi, and K. Sivakumar, editors, National Science Foundation Workshop on Next Generation Data Mining, pages 126-133, Baltimore, MD, Nov. 1-3 2002 view Fienberg, S.E. and Slavkovic, A.B. Preserving the Confidentiality of Categorical Statistical Data Bases When Releasing Information for Association Rules. In Proc. of Data Mining and Knowledge Discovery Journal, 2004 view Sebastien Gambs. Balazs Kegl. Esma Aımeur. Privacy-Preserving Boosting. In proc. Data Mining and Knowledge Discovery, April 2005 view E.C. Laskari, G.C. Meletiou, D.K. Tasoulis and M.N. Vrahatis. Data Mining and Cryptology. International Conference of Computational Methods in Sciences and Enginnering 2003 (ICCMSE 2003), pp. 346-349, 2003 Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering, January 2006 (Vol. 18, No. 1) pp. 92-106 view Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen. Hiding Sensitive Patterns in Association Rules Mining. COMPSAC 2004: 424-429 view Malika Mahoui and Bharat Bhargava and Mukesh Mohania. Data Mining for Web Security: UserWatcher. CERIAS TR 2001-20 view S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004: 219-229 view Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM 2003: 613-616 view Stanley R. M. Oliveira, Osmar R. Zaïane, Yücel Saygin. Secure Association Rule Sharing. PAKDD 2004: 74-85 view Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in Association Rule Mining. IDEAS 2003: 54-65 view Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent Patterns. TR02-13, Jun 2002 (technical report) view Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003 view Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton, C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287, Volume 1 - Issue 3, 2006 view Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693 view 14 248. J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents. Engineering Applications of Artificial Intelligence, 2005 view 249. Josenildo Costa da Silva, Matthias Klusch. Inference on Distributed Data Clustering. MLDM 2005: 610-619 250. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view 251. Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc. 252. 253. 254. 255. of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30, 2005 view Staal A. Vinterbo. Privacy: A Machine Learning View. IEEE Transactions on Knowledge and Data Engineering, Volume 16 , Issue 8 (August 2004), Pages: 939 - 948 view En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining. COMPSAC (1) 2005 : 511-516 view Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach, California, USA html 15. Pantazopoulos, K.N., Verykios, V.S., and Houstis, E.N. A Knowledge-Based System for the Evaluation of Option Pricing Algorithms. In Proceedings of 4th IEEE/IAFE/INFORMS Conference on Computational Intelligence in Financial Engineering (CIFEr'98), pp.123-140, March 1998, New York, NY, USA. 16. Houstis, C.H., Papatheodorou, T.S., Verykios, V.S., Floratos, A. and Elmagarmid, A.K. BIND: A Biomedical Interoperable Database System. In Proceedings of 5th International Conference on Database Expert System Applications (DEXA’94), pp.671-679, September 1994, Athens, Greece (Lecture Notes in Computer Science, vol. 856, Springer 1994). Citations 256. Toni Kazic. Semiotes. A Semantics for Sharing. Bioinformatics. 16:1129-1144, 2000 view 17. Vergis, A. and Verykios, V.S. On the Testability of Purely Recursive Digital Filters. In Proceedings of 6th International Conference on Parallel Architectures and Languages Europe (PARLE’ 94), pp. 85-96, July 1994, Athens, Greece (Lecture Notes in Computer Science, vol. 817, Springer 1994). ΔΗΜΟΣΙΕΥΣΕΙΣ ΥΠΟ ΚΡΙΣΗ 1. Cochinwala, M., Dalal, S., Elmagarmid, A.K., and Verykios, V.S., Record Matching: Past, Present and Future. Submitted to ACM Computing Surveys. ΤΕΧΝΙΚΕΣ ΑΝΑΦΟΡΕΣ 1. Elmagarmid, A.K., Hpeirotis, P. and Verykios, V.S.. Duplicate Record Detection. Technical Report, New York University, March 14, 2006 15 2. Elfeky, M.G., Verykios, V.S., Elmagarmid, A.K., Ghanem, T.M., Huwait, A.R. Record Linkage: A Machine Learning Approach, A Toolbox, and a Digital Government Web Service. Available as Technical Report CSD-TR #03-024, Department of Computer Sciences, Purdue University, July 2003. 3. Cochinwala, M., Dalal, S., Elmagarmid, A.K., and Verykios, V.S. Record Matching: Past, Present and Future. Available as Technical Report CSD-TR #01-013, Department of Computer Sciences, Purdue University, July 2001. Citations 257. Rundqvist, David. Grouping Biological Data. Undergraduate thesis Y-level 20 p. (Bioinformatics). Linköping University, Department of Computer and Information Science. April 2006 view 4. Verykios, V.S., Elmagarmid, A.K., and Moustakides, G.V. Cost Optimal Record/Entity Matching. Available as Technical Report CSD-TR #01-014, Department of Computer Sciences, Purdue University, July 2001. 5. Houstis, E.N., Catlin, A.C., Rice, J.R., Verykios, V.S., Ramakrishnan, N. and Houstis, C.H. PYTHIA-II: A Knowledge/Database system for Managing Performance Data and Recommending Scientific Software. Available as Technical Report CSD-TR #99-31, Department of Computer Sciences, Purdue University, March 2000. 6. Verykios, V.S., Elmagarmid, A.K., and Houstis, E.N. Record Matching to Improve Data Quality. Available as Technical Report CSD-TR #99-005, Department of Computer Sciences, Purdue University, February 1999. 7. Verykios, V.S., and Houstis, E.N. Parallel ELLPACK 3D Problem Solving Environment. Available as Technical Report CSD-TR #97-028, Department of Computer Sciences, Purdue University, May 1997. 16