Sciweavers

19 search results - page 4 / 4
» Control Theory: a Foundational Technique for Self Managing D...
Sort
View
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 11 days ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
PODS
2001
ACM
148views Database» more  PODS 2001»
14 years 5 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
CCS
2005
ACM
13 years 11 months ago
Secure collaboration in mediator-free environments
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several ...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ATAL
2007
Springer
13 years 11 months ago
Empirical game-theoretic analysis of the TAC Supply Chain game
The TAC Supply Chain Management (TAC/SCM) game presents a challenging dynamic environment for autonomous decision-making in a salient application domain. Strategic interactions co...
Patrick R. Jordan, Christopher Kiekintveld, Michae...