Database Systems, pages 247255, Santa
Barbara, May 2001.
[5] Rakesh Agrawal and Ramakrishnan Srikant,
Privacy-preserving data mining, In Proceeding
of the ACM SIGMOD Conference on
Management of Data, pages 439450, Dallas,
Texas, May 2000. ACM Press.
[6] Shuting Xu, Jun Zhang, Dianwei Han, and Jie
Wang, Data distortion for privacy protection in a
terrorist Analysis system. P. Kantor et al (Eds.):
ISI 2005, LNCS 3495, pp.459-464, 2005
[7] UCIMachine Learning Repository.
http://www.ics.uci.edu/mlearn/mlsummary.html.
[8] R. Duda, P. Hart, and D. Stork, Pattern
Classification, John Wiley and Sons, 2001.
[9] Amara Graps, An introduction to Wavelets,
IEEE Computational Science and Engineering,
vol 2, no. 2. IEEE Computer society press, 1995.
[10] T. Li, Q. Li, S. Zhu, and M Ogihara, A Survey
on Wavelet Application in Data Mining. ACM
SIGKDD Explorations. Vol 4, issue 2, pp. 49-68,
2002.
[11] C. Taswell, Handbook of Wavelet Transform
Algorithms. Boston, MA: Birkhäuser, 1996.