关注
Johannes Gehrke
Johannes Gehrke
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
Acm transactions on knowledge discovery from data (tkdd) 1 (1), 3-es, 2007
69922007
Automatic subspace clustering of high dimensional data for data mining applications
R Agrawal, J Gehrke, D Gunopulos, P Raghavan
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
43731998
Database management systems
R Ramakrishnan, J Gehrke
McGraw-Hill, Inc., 2002
40482002
The cougar approach to in-network query processing in sensor networks
Y Yao, J Gehrke
ACM Sigmod record 31 (3), 9-18, 2002
20312002
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission
R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
20262015
Gossip-based computation of aggregate information
D Kempe, A Dobra, J Gehrke
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
18972003
Sequential pattern mining using a bitmap representation
J Ayres, J Flannick, J Gehrke, T Yiu
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
16512002
Big data and its technical challenges
HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ...
Communications of the ACM 57 (7), 86-94, 2014
14692014
Privacy preserving mining of association rules
A Evfimievski, R Srikant, R Agrawal, J Gehrke
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
13722002
Scaling mining algorithms to large databases
P Bradley, J Gehrke, R Ramakrishnan, R Srikant
Communications of the ACM 45 (8), 38-43, 2002
13242002
Towards sensor database systems
P Bonnet, J Gehrke, P Seshadri
International Conference on mobile Data management, 3-14, 2001
12562001
Detecting change in data streams
D Kifer, S Ben-David, J Gehrke
VLDB 4, 180-191, 2004
11922004
Mafia: A maximal frequent itemset algorithm for transactional databases
D Burdick, M Calimlim, J Gehrke
Proceedings 17th international conference on data engineering, 443-452, 2001
11722001
Limiting privacy breaches in privacy preserving data mining
A Evfimievski, J Gehrke, R Srikant
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
11012003
Query Processing in Sensor Networks.
Y Yao, J Gehrke
Cidr, 233-244, 2003
10452003
Privacy: Theory meets practice on the map
A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber
2008 IEEE 24th international conference on data engineering, 277-286, 2008
8582008
Querying the physical world
P Bonnet, J Gehrke, P Seshadri
IEEE personal Communications 7 (5), 10-15, 2000
7412000
CACTUS—clustering categorical data using summaries
V Ganti, J Gehrke, R Ramakrishnan
Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999
7321999
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
7162010
Intelligible models for classification and regression
Y Lou, R Caruana, J Gehrke
Proceedings of the 18th ACM SIGKDD international conference on Knowledge …, 2012
6292012
系统目前无法执行此操作,请稍后再试。
文章 1–20