Sciweavers

712 search results - page 119 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CN
2011
129views more  CN 2011»
14 years 4 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
MP
2010
150views more  MP 2010»
14 years 4 months ago
The algebraic degree of semidefinite programming
Given a generic semidefinite program, specified by matrices with rational entries, each coordinate of its optimal solution is an algebraic number. We study the degree of the minima...
Jiawang Nie, Kristian Ranestad, Bernd Sturmfels
EDBT
2009
ACM
90views Database» more  EDBT 2009»
15 years 4 months ago
Privacy-preserving data mashup
Mashup is a web technology that combines information from more than one source into a single web application. This technique provides a new platform for different data providers ...
Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patr...
93
Voted
CCS
2009
ACM
15 years 10 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
92
Voted
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava