Sciweavers

653 search results - page 113 / 131
» Database Privacy
Sort
View
CIKM
2008
Springer
15 years 1 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
ICAIL
2007
ACM
15 years 1 months ago
P2P systems in legal networks: another "small world" case
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Ugo Pagallo, Giancarlo Ruffo
LREC
2008
121views Education» more  LREC 2008»
15 years 1 months ago
The IFADV Corpus: a Free Dialog Video Corpus
Research into spoken language has become more visual over the years. Both fundamental and applied research have progressively included gestures, gaze, and facial expression. Corpo...
Rob van Son, Wieneke Wesseling, Eric Sanders, Henk...
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
15 years 25 days ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 3 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma