Sciweavers

1640 search results - page 11 / 328
» Deriving Private Information from Randomized Data
Sort
View
SIGSOFT
2008
ACM
15 years 10 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
KDD
2005
ACM
171views Data Mining» more  KDD 2005»
15 years 10 months ago
Deriving marketing intelligence from online discussion
Weblogs and message boards provide online forums for discussion that record the voice of the public. Woven into this mass of discussion is a wide range of opinion and commentary a...
Natalie S. Glance, Matthew Hurst, Kamal Nigam, Mat...
88
Voted
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
15 years 10 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
BC
2000
75views more  BC 2000»
14 years 9 months ago
Predictions derived from modelling the hippocampal role in navigation
A computational model of the lesion and single unit data from navigation in rats is reviewed. The model uses external (visual) and internal (odometric) information from the environ...
Neil Burgess, Andrew Jackson, Tom Hartley, John O'...
FOCS
2008
IEEE
15 years 4 months ago
What Can We Learn Privately?
Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept ...
Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi ...