µ  -ANT: semantic microaggregation-based anonymization tool

D Sánchez, S Martínez, J Domingo-Ferrer… - …, 2020 - academic.oup.com
Motivation Detailed patient data are crucial for medical research. Yet, these healthcare data
can only be released for secondary use if they have undergone anonymization. Results We …

Minimizing energy consumption of multiple-processors-core systems with simultaneous task allocation, scheduling and voltage assignment

LF Leung, CY Tsui, WH Ki - ASP-DAC 2004: Asia and South …, 2004 - ieeexplore.ieee.org
In this paper, we tackle the problem of minimizing the energy consumption of multiple-
processors-core system using multiple variable supply voltages. Given a set of tasks and …

Pfsgeo: Preference-enriched faceted search for geographical data

P Lionakis, Y Tzitzikas - On the Move to Meaningful Internet Systems. OTM …, 2017 - Springer
In this paper we show how an exploratory search process, specifically the Preference-
enriched Faceted Search (PFS) process, can be enriched for exploring datasets that also …

[PDF][PDF] Semantic Anonymisation of Set-valued Data.

M Batet, A Erola, D Sánchez, J Castellà-Roca - ICAART (1), 2014 - scitepress.org
It is quite common that companies and organisations require of releasing and exchanging
information related to individuals. Due to the usual sensitive nature of these data …

Service integrity assurance for distributed computation outsourcing

AT Haghighat, M Shajari - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
In this paper, we propose a method to ensure service integrity for distributed computation
outsourcing in different contexts, such as volunteer computing, grid computing, MapReduce …

TBM, a transformation based method for microaggregation of large volume mixed data

M Salari, S Jalili, R Mortazavi - Data mining and knowledge discovery, 2017 - Springer
Due to recent advances in data collection and processing, data publishing has emerged by
some organizations for scientific and commercial purposes. Published data should be …

文本聚类研究综述

曹晓 - 情报探索, 2016 - cqvip.com
[目的/意义] 文本聚类技术是提高搜索引擎性能的有效方法, 是对文本信息进行组织的有效手段.[
方法/过程] 介绍了文本聚类的研究背景和研究内容, 总结了引入本体技术的文本聚类研究 …

[PDF][PDF] 一种基于关键词的微博话题聚类算法

林丹, 刘建明, 谷志瑜 - 计算机应用与软件, 2018 - shcas.net
摘要由于微博跟现实生活有着密不可分的联系, 微博的话题聚类可以发掘人们所关注的话题,
有利于引导公众舆情. 由于传统的文本聚类方法主要适用于长文本, LDA …

Improving data utility in differential privacy and k-anonymity

J Soria-Comas - arXiv preprint arXiv:1307.0966, 2013 - arxiv.org
We focus on two mainstream privacy models: k-anonymity and differential privacy. Once a
privacy model has been selected, the goal is to enforce it while preserving as much data …

Unsupervised semantic clustering of Twitter hashtags

C Vicient, A Moreno - ECAI 2014, 2014 - ebooks.iospress.nl
Social micro-blogging networks such as Twitter provide an enormous amount of information,
and their automated and unsupervised analysis constitutes an exciting research challenge …