L-diversity: Privacy beyond k-anonymity A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam Acm transactions on knowledge discovery from data (tkdd) 1 (1), 3-es, 2007 | 6992 | 2007 |
Automatic subspace clustering of high dimensional data for data mining applications R Agrawal, J Gehrke, D Gunopulos, P Raghavan Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998 | 4373 | 1998 |
Database management systems R Ramakrishnan, J Gehrke McGraw-Hill, Inc., 2002 | 4048 | 2002 |
The cougar approach to in-network query processing in sensor networks Y Yao, J Gehrke ACM Sigmod record 31 (3), 9-18, 2002 | 2031 | 2002 |
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 2026 | 2015 |
Gossip-based computation of aggregate information D Kempe, A Dobra, J Gehrke 44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003 | 1897 | 2003 |
Sequential pattern mining using a bitmap representation J Ayres, J Flannick, J Gehrke, T Yiu Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002 | 1651 | 2002 |
Big data and its technical challenges HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ... Communications of the ACM 57 (7), 86-94, 2014 | 1469 | 2014 |
Privacy preserving mining of association rules A Evfimievski, R Srikant, R Agrawal, J Gehrke Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002 | 1372 | 2002 |
Scaling mining algorithms to large databases P Bradley, J Gehrke, R Ramakrishnan, R Srikant Communications of the ACM 45 (8), 38-43, 2002 | 1324 | 2002 |
Towards sensor database systems P Bonnet, J Gehrke, P Seshadri International Conference on mobile Data management, 3-14, 2001 | 1256 | 2001 |
Detecting change in data streams D Kifer, S Ben-David, J Gehrke VLDB 4, 180-191, 2004 | 1192 | 2004 |
Mafia: A maximal frequent itemset algorithm for transactional databases D Burdick, M Calimlim, J Gehrke Proceedings 17th international conference on data engineering, 443-452, 2001 | 1172 | 2001 |
Limiting privacy breaches in privacy preserving data mining A Evfimievski, J Gehrke, R Srikant Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003 | 1101 | 2003 |
Query Processing in Sensor Networks. Y Yao, J Gehrke Cidr, 233-244, 2003 | 1045 | 2003 |
Privacy: Theory meets practice on the map A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber 2008 IEEE 24th international conference on data engineering, 277-286, 2008 | 858 | 2008 |
Querying the physical world P Bonnet, J Gehrke, P Seshadri IEEE personal Communications 7 (5), 10-15, 2000 | 741 | 2000 |
CACTUS—clustering categorical data using summaries V Ganti, J Gehrke, R Ramakrishnan Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999 | 732 | 1999 |
Differential privacy via wavelet transforms X Xiao, G Wang, J Gehrke IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010 | 716 | 2010 |
Intelligible models for classification and regression Y Lou, R Caruana, J Gehrke Proceedings of the 18th ACM SIGKDD international conference on Knowledge …, 2012 | 629 | 2012 |