Sciweavers

87 search results - page 1 / 18
» Anonymized Data: Generation, models, usage
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
13 years 12 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
MOBISYS
2003
ACM
14 years 4 months ago
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save...
Marco Gruteser, Dirk Grunwald
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 5 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
INFOCOM
1995
IEEE
13 years 8 months ago
Usage-Based Pricing of Packet Data Generated by a Heterogeneous User Population
Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we pro...
Michael L. Honig, Kenneth Steiglitz
TMC
2008
159views more  TMC 2008»
13 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu