Sciweavers

3395 search results - page 93 / 679
» Computational Differential Privacy
Sort
View
TIT
2008
61views more  TIT 2008»
14 years 10 months ago
A Probabilistic Upper Bound on Differential Entropy
A novel, non-trivial, probabilistic upper bound on the entropy of an unknown one-dimensional distribution, given the support of the distribution and a sample from that distribution...
Erik G. Learned-Miller, Joseph DeStefano
MICS
2010
62views more  MICS 2010»
14 years 4 months ago
Linear Differential Elimination for Analytic Functions
This paper provides methods to decide whether a given analytic function of several complex variables is a linear combination of finitely many given analytic functions with coeffic...
Wilhelm Plesken, Daniel Robertz
93
Voted
PERVASIVE
2005
Springer
15 years 3 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
NSDI
2008
15 years 13 days ago
Understanding Privacy Settings in Facebook with an Audience View
Users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Our ongoing research investigates mec...
Heather Richter Lipford, Andrew Besmer, Jason Wats...
INTERACT
2007
14 years 11 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu