Sciweavers

1640 search results - page 94 / 328
» Deriving Private Information from Randomized Data
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
14 years 7 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
TSD
2010
Springer
14 years 7 months ago
Comparison of Different Lemmatization Approaches through the Means of Information Retrieval Performance
This paper presents a quantitative performance analysis of two different approaches to the lemmatization of the Czech text data. The first one is based on manually prepared diction...
Jakub Kanis, Lucie Skorkovská
GLOBECOM
2009
IEEE
15 years 4 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
GI
2007
Springer
15 years 4 months ago
Classification of Vegetation Fusing Multichannel SAR Data by a Fuzzy Approach
: The improved spatial resolution of modern SAR sensors allows the distinction of significant areas in rural as well as in urban environments. For this purpose additional informati...
Antje Thiele, Karsten Schulz, Ulrich Thoennessen, ...
SPAA
2010
ACM
14 years 10 months ago
On the bit communication complexity of randomized rumor spreading
We study the communication complexity of rumor spreading in the random phone-call model. Suppose n players communicate in parallel rounds, where in each round every player calls a...
Pierre Fraigniaud, George Giakkoupis