Sciweavers

1906 search results - page 293 / 382
» Data Privacy
Sort
View
165
Voted
CIKM
2008
Springer
15 years 5 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
116
Voted
ECIR
2007
Springer
15 years 5 months ago
Personalized Communities in a Distributed Recommender System
The amount of data exponentially increases in information systems and it becomes more and more difficult to extract the most relevant information within a very short time. Among ot...
Sylvain Castagnos, Anne Boyer
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 5 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
129
Voted
EHCI
2001
15 years 5 months ago
Information Sharing with Handheld Appliances
Handheld appliances such as PDAs, organisers or electronic pens are currently very popular. Handhelds are used to enter and retrieve useful information, e.g., dates, to do lists, m...
Jörg Roth
117
Voted
DBSEC
2008
103views Database» more  DBSEC 2008»
15 years 4 months ago
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Abstract. When generalization algorithms are known to the public, an adversary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed ...
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...