Sciweavers

5 search results - page 1 / 1
» Approximate privacy: foundations and quantification (extende...
Sort
View
SIGECOM
2010
ACM
148views ECommerce» more  SIGECOM 2010»
13 years 5 months ago
Approximate privacy: foundations and quantification (extended abstract)
Joan Feigenbaum, Aaron D. Jaggard, Michael Schapir...
CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 5 months ago
Distributed Successive Approximation Coding using Broadcast Advantage: The Two-Encoder Case
Abstract-- Traditional distributed source coding rarely considers the possible link between separate encoders. However, the broadcast nature of wireless communication in sensor net...
Zichong Chen, Guillermo Barrenetxea, Martin Vetter...
CCS
2005
ACM
13 years 11 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
14 years 7 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
14 years 6 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal