Sciweavers

2386 search results - page 278 / 478
» Database Security 2000
Sort
View
MVA
2000
115views Computer Vision» more  MVA 2000»
15 years 4 months ago
Image Retrieval through Abstract Shape Indication
trieval through Abstract Shape Indication A. Brucale, F. Cesari, M. d'Amico, M. Ferri, P. Frosini, L. Gualandri, M. Guerra, A. Lovato, I. Pace Dip. di Matematica, Universit`a ...
Aldo Brucale, Fabio Cesari, Michele d'Amico, Massi...
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 3 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 3 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
124
Voted
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 9 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 8 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu