Sciweavers

24188 search results - page 220 / 4838
» Computing on Encrypted Data
Sort
View
139
Voted
APWEB
2005
Springer
15 years 9 months ago
An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments
Data management issues in mobile computing environments have got lots of concerns of relevant researchers. Among these research topics, data broadcast has been extensively investig...
Guohui Li, Hongya Wang, Jixiong Chen, Yingyuan Xia...
GI
2009
Springer
15 years 8 months ago
Self-monitoring for Computer Users
: We are presenting a tool for collecting and analysing computer usage data. The observed data are locally used by the user to self-monitor and self-reflect her behaviour, decontro...
Maren Scheffel, Martin Friedrich, Marco Jahn, Uwe ...
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 3 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 3 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 10 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek