Sciweavers

653 search results - page 115 / 131
» Database Privacy
Sort
View
EDBT
2006
ACM
118views Database» more  EDBT 2006»
15 years 12 months ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 12 months ago
Anonymity for continuous data publishing
k-anonymization is an important privacy protection mechanism in data publishing. While there has been a great deal of work in recent years, almost all considered a single static r...
Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jia...
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
15 years 11 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
15 years 6 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
15 years 6 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li