Johannes Gehrke
Johannes Gehrke
Verified email at - Homepage
Cited by
Cited by
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
Acm transactions on knowledge discovery from data (tkdd) 1 (1), 3-es, 2007
Automatic subspace clustering of high dimensional data for data mining applications
R Agrawal, J Gehrke, D Gunopulos, P Raghavan
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
Database management systems
R Ramakrishnan, J Gehrke
McGraw-Hill, Inc., 2002
The cougar approach to in-network query processing in sensor networks
Y Yao, J Gehrke
ACM Sigmod record 31 (3), 9-18, 2002
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission
R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
Gossip-based computation of aggregate information
D Kempe, A Dobra, J Gehrke
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
Sequential pattern mining using a bitmap representation
J Ayres, J Flannick, J Gehrke, T Yiu
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
Big data and its technical challenges
HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ...
Communications of the ACM 57 (7), 86-94, 2014
Privacy preserving mining of association rules
A Evfimievski, R Srikant, R Agrawal, J Gehrke
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
Scaling mining algorithms to large databases
P Bradley, J Gehrke, R Ramakrishnan, R Srikant
Communications of the ACM 45 (8), 38-43, 2002
Towards sensor database systems
P Bonnet, J Gehrke, P Seshadri
International Conference on mobile Data management, 3-14, 2001
Detecting change in data streams
D Kifer, S Ben-David, J Gehrke
VLDB 4, 180-191, 2004
Mafia: A maximal frequent itemset algorithm for transactional databases
D Burdick, M Calimlim, J Gehrke
Proceedings 17th international conference on data engineering, 443-452, 2001
Limiting privacy breaches in privacy preserving data mining
A Evfimievski, J Gehrke, R Srikant
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
Query Processing in Sensor Networks.
Y Yao, J Gehrke
Cidr, 233-244, 2003
Privacy: Theory meets practice on the map
A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber
2008 IEEE 24th international conference on data engineering, 277-286, 2008
Querying the physical world
P Bonnet, J Gehrke, P Seshadri
IEEE personal Communications 7 (5), 10-15, 2000
CACTUS—clustering categorical data using summaries
V Ganti, J Gehrke, R Ramakrishnan
Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
RainForest—a framework for fast decision tree construction of large datasets
J Gehrke, R Ramakrishnan, V Ganti
Data Mining and Knowledge Discovery 4, 127-162, 2000
The system can't perform the operation now. Try again later.
Articles 1–20