9783642017179-3642017177-Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Lecture Notes in Computer Science, 5456)

Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Lecture Notes in Computer Science, 5456)

FREE US shipping
Buy

From $16.50

Summary

Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Lecture Notes in Computer Science, 5456) (ISBN-13: 9783642017179 and ISBN-10: 3642017177), written by authors Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradley Malin, was published by Springer in 2009. With an overall rating of 4.5 stars, it's a notable title among other Information Management (Processes & Infrastructure, Business Technology, AI & Machine Learning, Computer Science, Data Mining, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Computer & Internet Law, History & Culture, Science & Technology, Legal Theory & Systems, Management & Leadership) books. You can easily purchase or rent Privacy, Security, and Trust in KDD: Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, Nevada, August 24, 2008, Revised Selected Papers (Lecture Notes in Computer Science, 5456) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book