Sciweavers

228 search results - page 39 / 46
» A New Framework for RFID Privacy
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
ICDE
2009
IEEE
392views Database» more  ICDE 2009»
16 years 9 months ago
FF-Anonymity: When Quasi-Identifiers Are Missing
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Y...
ECSCW
2001
14 years 11 months ago
Community support and identity management
Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange Such applications usually mak...
Michael Koch, Wolfgang Wörndl
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava