Sciweavers

2355 search results - page 2 / 471
» Anonymizing Temporal Data
Sort
View
AINA
2011
IEEE
12 years 9 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
ICDE
2009
IEEE
132views Database» more  ICDE 2009»
14 years 7 months ago
Using Anonymized Data for Classification
In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing privacy sensitive data sets. This interest in anonymization t...
Ali Inan, Murat Kantarcioglu, Elisa Bertino
TMC
2008
159views more  TMC 2008»
13 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
PERVASIVE
2011
Springer
12 years 8 months ago
Identifying Important Places in People's Lives from Cellular Network Data
People spend most of their time at a few key locations, such as home and work. Being able to identify how the movements of people cluster around these “important places” is cru...
Sibren Isaacman, Richard Becker, Ramón C&aa...
ENTCS
2007
110views more  ENTCS 2007»
13 years 5 months ago
Data Anonymity in the FOO Voting Scheme
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal context. Data anonymity expresses whether some piece of observed data, such as a v...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink