Privacy Preserving Data Mining
Guardado en:
| Autor Principal: | |
|---|---|
| Autor Corporativo: | |
| Otros Autores: | , |
| Formato: | Electrónico |
| Idioma: | English |
| Publicado: |
Boston, MA :
Springer Science+Business Media, Inc.,
2006.
|
| Series: | Advances in Information Security,
19 |
| Materias: | |
| Acceso en línea: | SpringerLink, via BECYT |
| Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
| LEADER | 01388nmm a22003735u 4500 | ||
|---|---|---|---|
| 001 | springer.978-0-387-25886-7 | ||
| 003 | Springer | ||
| 005 | 20100326153606.0 | ||
| 007 | cr#nn#008mamaa | ||
| 008 | 100301s2006 xx j eng#d | ||
| 020 | |a 9780387294896 | ||
| 100 | 1 | |a Vaidya, Jaideep. | |
| 245 | 1 | 0 | |a Privacy Preserving Data Mining |h [electronic resource] / |c by Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton. |
| 260 | |a Boston, MA : |b Springer Science+Business Media, Inc., |c 2006. | ||
| 300 | |b v.: digital | ||
| 440 | 0 | |a Advances in Information Security, |x 1568-2633 ; |v 19 | |
| 650 | 0 | |a Computer science | |
| 650 | 0 | |a Computer Communication Networks | |
| 650 | 0 | |a Data structures (Computer science) | |
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Database management | |
| 650 | 0 | |a Data mining | |
| 650 | 0 | |a Information storage and retrieval systems | |
| 650 | 1 | 4 | |a Computer Science |
| 650 | 2 | 4 | |a Data Mining and Knowledge Discovery |
| 650 | 2 | 4 | |a Database Management |
| 650 | 2 | 4 | |a Data Structures, Cryptology and Information Theory |
| 650 | 2 | 4 | |a Data Encryption |
| 650 | 2 | 4 | |a Information Storage and Retrieval |
| 650 | 2 | 4 | |a Computer Communication Networks |
| 700 | 1 | |a Zhu, Yu Michael. | |
| 700 | 1 | |a Clifton, Christopher W. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-0-387-29489-6 |y SpringerLink, via BECYT |
