Privacy Preserving Using Dummy Data for Set Operations in Itemset Mining Implemented with ZDDs. Otaki, K., Sugiyama, M., & Yamamoto, A. IEICE Trans. Inf. Syst., 95-D(12):3017–3025, 2012. Paper doi bibtex @article{DBLP:journals/ieicet/OtakiSY12,
author = {Keisuke Otaki and
Mahito Sugiyama and
Akihiro Yamamoto},
title = {Privacy Preserving Using Dummy Data for Set Operations in Itemset
Mining Implemented with ZDDs},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {95-D},
number = {12},
pages = {3017--3025},
year = {2012},
url = {https://doi.org/10.1587/transinf.E95.D.3017},
doi = {10.1587/TRANSINF.E95.D.3017},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/OtakiSY12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"DwxSSWjvNcuRxfMRb","bibbaseid":"otaki-sugiyama-yamamoto-privacypreservingusingdummydataforsetoperationsinitemsetminingimplementedwithzdds-2012","downloads":0,"creationDate":"2015-04-16T06:37:40.040Z","title":"Privacy Preserving Using Dummy Data for Set Operations in Itemset Mining Implemented with ZDDs","author_short":["Otaki, K.","Sugiyama, M.","Yamamoto, A."],"year":2012,"bibtype":"article","biburl":"https://dblp.org/pid/123/5097.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Keisuke"],"propositions":[],"lastnames":["Otaki"],"suffixes":[]},{"firstnames":["Mahito"],"propositions":[],"lastnames":["Sugiyama"],"suffixes":[]},{"firstnames":["Akihiro"],"propositions":[],"lastnames":["Yamamoto"],"suffixes":[]}],"title":"Privacy Preserving Using Dummy Data for Set Operations in Itemset Mining Implemented with ZDDs","journal":"IEICE Trans. Inf. Syst.","volume":"95-D","number":"12","pages":"3017–3025","year":"2012","url":"https://doi.org/10.1587/transinf.E95.D.3017","doi":"10.1587/TRANSINF.E95.D.3017","timestamp":"Sat, 11 Apr 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/ieicet/OtakiSY12.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ieicet/OtakiSY12,\n author = {Keisuke Otaki and\n Mahito Sugiyama and\n Akihiro Yamamoto},\n title = {Privacy Preserving Using Dummy Data for Set Operations in Itemset\n Mining Implemented with ZDDs},\n journal = {{IEICE} Trans. Inf. Syst.},\n volume = {95-D},\n number = {12},\n pages = {3017--3025},\n year = {2012},\n url = {https://doi.org/10.1587/transinf.E95.D.3017},\n doi = {10.1587/TRANSINF.E95.D.3017},\n timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/ieicet/OtakiSY12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Otaki, K.","Sugiyama, M.","Yamamoto, A."],"key":"DBLP:journals/ieicet/OtakiSY12","id":"DBLP:journals/ieicet/OtakiSY12","bibbaseid":"otaki-sugiyama-yamamoto-privacypreservingusingdummydataforsetoperationsinitemsetminingimplementedwithzdds-2012","role":"author","urls":{"Paper":"https://doi.org/10.1587/transinf.E95.D.3017"},"metadata":{"authorlinks":{}},"html":""},"search_terms":["privacy","preserving","using","dummy","data","set","operations","itemset","mining","implemented","zdds","otaki","sugiyama","yamamoto"],"keywords":[],"authorIDs":[],"dataSources":["gdgqYz5nkXFiYzQ9j","m4JYMKY7Eve8dpHLm"]}