Privacy Preserving Data Mining Models and Algorithms~tqw~ darksiderg

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -

Torrent info

Name:Privacy Preserving Data Mining Models and Algorithms~tqw~ darksiderg

Total Size: 5.60 MB

Magnet: Magnet Link

Seeds: 3

Leechers: 0

Stream: Watch Online @ Movie4u

Last Updated: 2010-11-30 12:18:05 (Update Now)

Torrent added: 2009-08-21 08:32:52

VPN For Torrents

Torrent Files List

tracked_by_h33t_com.txt (Size: 5.60 MB) (Files: 3)


0.02 KB

 Privacy-Preserving Data Mining Models and Algorithms~tqw~_darksiderg.pdf

5.60 MB

 Privacy-Preserving Data Mining Models and Algorithms~tqw~_darksiderg.nfo

3.93 KB

Announce URL: http://www.h33t.com:3310/announce

Torrent description

Privacy-Preserving Data Mining: Models and Algorithms

General Information
Type.................: Ebook
Part Size............: 5,870,818 bytes

Post Information
Posted by............: ~tqw~

Release Notes
Advances in hardware technology have increased the capability to store and
record personal data about consumers and individuals. This has caused concerns
that personal data may be used for a variety of intrusive or malicious purposes.

Privacy Preserving Data Mining: Models and Algorithms proposes a number of
techniques to perform the data mining tasks in a privacy-preserving way. These
techniques generally fall into the following categories: data modification
techniques, cryptographic methods and protocols for data sharing, statistical
techniques for disclosure and inference control, query auditing methods,
randomization and perturbation-based techniques. This edited volume also
contains surveys by distinguished researchers in the privacy field. Each survey
includes the key research content as well as future research directions of a
particular topic in privacy.

Privacy Preserving Data Mining: Models and Algorithms is designed for
researchers, professors, and advanced-level students in computer science. This
book is also suitable for practitioners in industry.

Table Of Contents

Preface v
List of Figures xvii
List of Tables xxi
1 An Introduction to Privacy-Preserving Data Mining 1
2 A General Survey of Privacy-Preserving Data Mining Models and Algorithms 11
3 A Survey of Inference Control Methods for Privacy-Preserving Data Mining 53
4 Measures of Anonymity 81
5 k-Anonymous Data Mining: A Survey 105
6 A Survey of RandomizationMethods for Privacy-PreservingDataMining 137
7 A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining 157
8 A Survey ofQuantification of Privacy Preserving Data Mining Algorithms 183
9 A Survey of Utility-based Privacy-Preserving Data TransformationMethods 207
10 Mining Association Rules under Privacy Constraints 239
11 A Survey of Association Rule Hiding Methods for Privacy 267
12 A Survey of Statistical Approaches to Preserving Confidentiality of
Contingency Table Entries 291
13 A Survey of Privacy-PreservingMethods Across Horizontally Partitioned Data
14 A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data 337
15 A Survey of Attack Techniques on Privacy-Preserving Data Perturbation
Methods 359
16 Private Data Analysis via Output Perturbation 383
17 A Survey of Query Auditing Techniques for Data Privacy 415
18 Privacy and the Dimensionality Curse 433
19 Personalized Privacy Preservation 461
20 Privacy-Preserving Data Stream Classification 487
Index 511

Product Details

* ISBN: 0387709916
* ISBN-13: 9780387709918
* Format: Hardcover, 535pp
* Publisher: Springer-Verlag New York, LLC
* Pub. Date: May 2008

Install Notes
PDF Reader

related torrents

Torrent name

health leech seeds Size

comments (0)

Main Menu