Sciweavers

2355 search results - page 223 / 471
» Anonymizing Temporal Data
Sort
View
164
Voted
VIS
2007
IEEE
149views Visualization» more  VIS 2007»
16 years 5 months ago
Time Dependent Processing in a Parallel Pipeline Architecture
Pipeline architectures provide a versatile and efficient mechanism for constructing visualizations, and they have been implemented in numerous libraries and applications over the p...
John Biddiscombe, Berk Geveci, Ken Martin, Kenn...
129
Voted
ICMI
2000
Springer
138views Biometrics» more  ICMI 2000»
15 years 7 months ago
Multimodal Speaker Detection Using Input/Output Dynamic Bayesian Networks
Inferring users' actions and intentions forms an integral part of design and development of any human-computer interface. The presence of noisy and at times ambiguous sensory ...
Vladimir Pavlovic, Ashutosh Garg, James M. Rehg
SPW
2004
Springer
15 years 9 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
236
Voted
SRDS
2010
IEEE
15 years 2 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
165
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 6 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu