Sciweavers

15254 search results - page 109 / 3051
» A k
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
49
Voted
SODA
2010
ACM
152views Algorithms» more  SODA 2010»
14 years 8 months ago
Towards the Randomized k-Server Conjecture: A Primal-Dual Approach
Nikhil Bansal, Niv Buchbinder, Joseph Naor
TKDE
2010
116views more  TKDE 2010»
14 years 8 months ago
k-Anonymity in the Presence of External Databases
Dimitris Sacharidis, Kyriakos Mouratidis, Dimitris...
TVCG
2010
141views more  TVCG 2010»
14 years 8 months ago
Fast Construction of k-Nearest Neighbor Graphs for Point Clouds
—We present a parallel algorithm for k-nearest neighbor graph construction that uses Morton ordering. Experiments show that our approach has the following advantages over existin...
Michael Connor, Piyush Kumar