Sciweavers

1906 search results - page 126 / 382
» Data Privacy
Sort
View
GEOINFO
2007
15 years 23 days ago
Trajectory Data Warehouses: Proposal of Design and Application to Exploit Data
In this paper we are interested in storing and perform OLAP queries about various aggregate trajectory properties. We consider a data stream environment where a set of mobile objec...
Fernando J. Braz
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 8 months ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
70
Voted
ICIS
2004
15 years 22 days ago
Opting-in or Opting-out on the Internet: Does it Really Matter?
Personal privacy has become one of the pressure points that comprises utmost primacy in the scientific community. An often debated privacy issue concerns the means of soliciting c...
Yee-Lin Lai, Kai Lung Hui
ESORICS
2010
Springer
14 years 11 months ago
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applicat...
Octavian Catrina, Sebastiaan de Hoogh
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 11 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen