Sciweavers

901 search results - page 3 / 181
» On Anonymization of String Data
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 4 months ago
SurePath: An Approach to Resilient Anonymous Routing
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
Yingwu Zhu, Yiming Hu
VLDB
2008
ACM
136views Database» more  VLDB 2008»
14 years 5 months ago
Efficient updates in dynamic XML data: from binary string to quaternary string
XML query processing based on labeling schemes has been thoroughly studied in the past several years. Recently efficient processing of updates in dynamic XML data has gained more a...
Changqing Li, Tok Wang Ling, Min Hu
AUSAI
2007
Springer
13 years 8 months ago
Effectiveness of Methods for Syntactic and Semantic Recognition of Numeral Strings: Tradeoffs Between Number of Features and Len
Abstract. This paper describes and compares the use of methods based on Ngrams (specifically trigrams and pentagrams), together with five features, to recognise the syntactic and s...
Kyongho Min, William H. Wilson, Byeong Ho Kang
CLEANDB
2006
ACM
145views Database» more  CLEANDB 2006»
13 years 10 months ago
Cleansing Databases of Misspelled Proper Nouns
The paper presents a data cleansing technique for string databases. We propose and evaluate an algorithm that identifies a group of strings that consists of (multiple) occurrence...
Arturas Mazeika, Michael H. Böhlen