Return to Article Details Privacy Preserving Mining in Code Profiling Data Download Download PDF