The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Raymond Chi-Wing Wong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei
    Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2006, pp:405-416 [Conf]
  2. Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
    Privacy-Preserving Frequent Pattern Mining across Private Databases. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:613-616 [Conf]
  3. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang
    MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:371-378 [Conf]
  4. Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang
    (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. [Citation Graph (0, 0)][DBLP]
    KDD, 2006, pp:754-759 [Conf]
  5. Raymond Chi-Wing Wong, Ada Wai-Chee Fu
    ISM: Item Selection for Marketing with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2004, pp:431-440 [Conf]
  6. Chi-Wah Wong, Oscar C. Au, Raymond Chi-Wing Wong, Hong-Kwai Lam
    Real-Time Rate Control Via Variable Frame Rate and Quantization Parameters. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:314-322 [Conf]
  7. Raymond Chi-Wing Wong, Ada Wai-Chee Fu
    Mining Top-K Itemsets over a Sliding Window Based on Zipfian Distribution. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  8. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang
    Data Mining for Inventory Item Selection with Cross-Selling Considerations. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:1, pp:81-112 [Journal]
  9. Raymond Chi-Wing Wong, Ada Wai-Chee Fu
    Mining top-K frequent itemsets from data streams. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2006, v:13, n:2, pp:193-217 [Journal]
  10. Sze-Chung Ngan, Tsang Lam, Raymond Chi-Wing Wong, Ada Wai-Chee Fu
    Mining N-most interesting itemsets without support threshold by the COFI-tree. [Citation Graph (0, 0)][DBLP]
    Int. J. Business Intelligence and Data Mining, 2005, v:1, n:1, pp:88-106 [Journal]
  11. Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang
    Mining favorable facets. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:804-813 [Conf]
  12. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei
    Minimality Attack in Privacy Preserving Data Publishing. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:543-554 [Conf]
  13. Raymond Chi-Wing Wong, Yufei Tao, Ada Wai-Chee Fu, Xiaokui Xiao
    On Efficient Spatial Matching. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:579-590 [Conf]
  14. Raymond Chi-Wing Wong, Yubao Liu, Jian Yin, Zhilan Huang, Ada Wai-Chee Fu, Jian Pei
    (alpha, k)-anonymity Based Privacy Preservation by Lossy Join. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM, 2007, pp:733-744 [Conf]
  15. Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei, Yip Sing Ho, Tai Wong, Yubao Liu
    Efficient Skyline Querying with Variable User Preferences on Nominal Attributes [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  16. Ada Wai-Chee Fu, Eamonn J. Keogh, Leo Yung Hang Lau, Chotirat (Ann) Ratanamahatana, Raymond Chi-Wing Wong
    Scaling and time warping in time series querying. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  17. Workshop Organizers' Message. [Citation Graph (, )][DBLP]


  18. Competitive Privacy: Secure Analysis on Integrated Sequence Data. [Citation Graph (, )][DBLP]


  19. Finding the influence set through skylines. [Citation Graph (, )][DBLP]


  20. FF-Anonymity: When Quasi-identifiers Are Missing. [Citation Graph (, )][DBLP]


  21. Global privacy guarantee in serial data publishing. [Citation Graph (, )][DBLP]


  22. Advanced Real-time Rate Control in H.264. [Citation Graph (, )][DBLP]


  23. On the Capacity of Multi-Channel Wireless Networks Using Directional Antennas. [Citation Graph (, )][DBLP]


  24. Publishing Skewed Sensitive Microdata. [Citation Graph (, )][DBLP]


  25. Advanced Macro-block Entropy Coding in H.264. [Citation Graph (, )][DBLP]


  26. Preserving Individual Privacy in Serial Data Publishing [Citation Graph (, )][DBLP]


  27. Can the Utility of Anonymized Data be used for Privacy Breaches? [Citation Graph (, )][DBLP]


  28. Anonymization with Worst-Case Distribution-Based Background Knowledge [Citation Graph (, )][DBLP]


Search in 2.500secs, Finished in 2.502secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002