Follow
Johannes Gehrke
Johannes Gehrke
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
Acm transactions on knowledge discovery from data (tkdd) 1 (1), 3-es, 2007
71782007
Automatic subspace clustering of high dimensional data for data mining applications
R Agrawal, J Gehrke, D Gunopulos, P Raghavan
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
44181998
Database management systems
R Ramakrishnan, J Gehrke
McGraw-Hill, Inc., 2002
41312002
Sparks of artificial general intelligence: Early experiments with gpt-4
S Bubeck, V Chandrasekaran, R Eldan, J Gehrke, E Horvitz, E Kamar, ...
arXiv preprint arXiv:2303.12712, 2023
32442023
Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission
R Caruana, Y Lou, J Gehrke, P Koch, M Sturm, N Elhadad
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
22152015
The cougar approach to in-network query processing in sensor networks
Y Yao, J Gehrke
ACM Sigmod record 31 (3), 9-18, 2002
20452002
Gossip-based computation of aggregate information
D Kempe, A Dobra, J Gehrke
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
19412003
Sequential pattern mining using a bitmap representation
J Ayres, J Flannick, J Gehrke, T Yiu
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
16722002
Big data and its technical challenges
HV Jagadish, J Gehrke, A Labrinidis, Y Papakonstantinou, JM Patel, ...
Communications of the ACM 57 (7), 86-94, 2014
15292014
Privacy preserving mining of association rules
A Evfimievski, R Srikant, R Agrawal, J Gehrke
Proceedings of the eighth ACM SIGKDD international conference on Knowledge …, 2002
13782002
Scaling mining algorithms to large databases
P Bradley, J Gehrke, R Ramakrishnan, R Srikant
Communications of the ACM 45 (8), 38-43, 2002
13332002
Towards sensor database systems
P Bonnet, J Gehrke, P Seshadri
International Conference on mobile Data management, 3-14, 2001
12612001
Detecting change in data streams
D Kifer, S Ben-David, J Gehrke
VLDB 4, 180-191, 2004
12242004
Mafia: A maximal frequent itemset algorithm for transactional databases
D Burdick, M Calimlim, J Gehrke
Proceedings 17th international conference on data engineering, 443-452, 2001
11732001
Limiting privacy breaches in privacy preserving data mining
A Evfimievski, J Gehrke, R Srikant
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
11252003
Query Processing in Sensor Networks.
Y Yao, J Gehrke
Cidr, 233-244, 2003
10482003
Privacy: Theory meets practice on the map
A Machanavajjhala, D Kifer, J Abowd, J Gehrke, L Vilhuber
2008 IEEE 24th international conference on data engineering, 277-286, 2008
8772008
Querying the physical world
P Bonnet, J Gehrke, P Seshadri
IEEE personal Communications 7 (5), 10-15, 2000
7482000
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
7402010
CACTUS—clustering categorical data using summaries
V Ganti, J Gehrke, R Ramakrishnan
Proceedings of the fifth ACM SIGKDD international conference on Knowledge …, 1999
7381999
The system can't perform the operation now. Try again later.
Articles 1–20