Johannes Gehrke
Johannes Gehrke
Verified email at microsoft.com
Title
Cited by
Cited by
Year
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1), 3-es, 2007
51432007
Automatic subspace clustering of high dimensional data for data mining applications
R Agrawal, J Gehrke, D Gunopulos, P Raghavan
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
37721998
Database management systems
R Ramakrishnan, J Gehrke
McGraw-Hill, 2000
33102000
The cougar approach to in-network query processing in sensor networks
Y Yao, J Gehrke
ACM Sigmod record 31 (3), 9-18, 2002
18382002
Gossip-based computation of aggregate information
D Kempe, A Dobra, J Gehrke
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
15482003
Sequential pattern mining using a bitmap representation
J Ayres, J Flannick, J Gehrke, T Yiu
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
14012002
Privacy preserving mining of association rules
A Evfimievski, R Srikant, R Agrawal, J Gehrke
Information Systems 29 (4), 343-364, 2004
12302004
Scaling mining algorithms to large databases
P Bradley, J Gehrke, R Ramakrishnan, R Srikant
Communications of the ACM 45 (8), 38-43, 2002
11922002
Towards sensor database systems
P Bonnet, J Gehrke, P Seshadri
International Conference on mobile Data management, 3-14, 2001
11542001
Mafia: A maximal frequent itemset algorithm for transactional databases
D Burdick, M Calimlim, J Gehrke
Proceedings 17th international conference on data engineering, 443-452, 2001
10712001
Query Processing in Sensor Networks.
Y Yao, J Gehrke
Cidr, 233-244, 2003
9772003
Big data and its technical challenges
HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ...
Communications of the ACM 57 (7), 86-94, 2014
9152014
Limiting privacy breaches in privacy preserving data mining
A Evfimievski, J Gehrke, R Srikant
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
8732003
Detecting change in data streams
D Kifer, S Ben-David, J Gehrke
VLDB 4, 180-191, 2004
8632004
10 challenging problems in data mining research
Q Yang, X Wu
International Journal of Information Technology & Decision Making 5 (04 …, 2006
7512006
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission
R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
7162015
Querying the physical world
P Bonnet, J Gehrke, P Seshadri
IEEE personal Communications 7 (5), 10-15, 2000
6812000
CACTUS—clustering categorical data using summaries
V Ganti, J Gehrke, R Ramakrishnan
Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999
6751999
Privacy: Theory meets practice on the map
A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber
2008 IEEE 24th international conference on data engineering, 277-286, 2008
5632008
Cayuga: A General Purpose Event Monitoring System.
AJ Demers, J Gehrke, B Panda, M Riedewald, V Sharma, WM White
Cidr 7, 412-422, 2007
4952007
The system can't perform the operation now. Try again later.
Articles 1–20