Johannes Gehrke
Johannes Gehrke
Zweryfikowany adres z microsoft.com - Strona główna
Cytowane przez
Cytowane przez
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1), 3-es, 2007
Automatic subspace clustering of high dimensional data for data mining applications
R Agrawal, J Gehrke, D Gunopulos, P Raghavan
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
Database management systems
R Ramakrishnan, J Gehrke, J Gehrke
McGraw-Hill, 2003
The cougar approach to in-network query processing in sensor networks
Y Yao, J Gehrke
ACM Sigmod record 31 (3), 9-18, 2002
Gossip-based computation of aggregate information
D Kempe, A Dobra, J Gehrke
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission
R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
Challenges and opportunities with Big Data 2011-1
D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ...
Sequential pattern mining using a bitmap representation
J Ayres, J Flannick, J Gehrke, T Yiu
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
Big data and its technical challenges
HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ...
Communications of the ACM 57 (7), 86-94, 2014
Privacy preserving mining of association rules
A Evfimievski, R Srikant, R Agrawal, J Gehrke
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
Scaling mining algorithms to large databases
P Bradley, J Gehrke, R Ramakrishnan, R Srikant
Communications of the ACM 45 (8), 38-43, 2002
Towards sensor database systems
P Bonnet, J Gehrke, P Seshadri
International Conference on mobile Data management, 3-14, 2001
Detecting change in data streams
D Kifer, S Ben-David, J Gehrke
VLDB 4, 180-191, 2004
Mafia: A maximal frequent itemset algorithm for transactional databases
D Burdick, M Calimlim, J Gehrke
Proceedings 17th international conference on data engineering, 443-452, 2001
Limiting privacy breaches in privacy preserving data mining
A Evfimievski, J Gehrke, R Srikant
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
Query Processing in Sensor Networks.
Y Yao, J Gehrke
Cidr, 233-244, 2003
Privacy: Theory meets practice on the map
A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber
2008 IEEE 24th international conference on data engineering, 277-286, 2008
Querying the physical world
P Bonnet, J Gehrke, P Seshadri
IEEE personal Communications 7 (5), 10-15, 2000
CACTUS—clustering categorical data using summaries
V Ganti, J Gehrke, R Ramakrishnan
Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20