Sciweavers

455 search results - page 32 / 91
» Differential Privacy in New Settings
Sort
View
83
Voted
IACR
2011
87views more  IACR 2011»
13 years 9 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
15 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
VLSID
2003
IEEE
134views VLSI» more  VLSID 2003»
15 years 10 months ago
A Framework for Energy and Transient Power Reduction during Behavioral Synthesis
Abstract-- In battery driven portable applications, the minimization of energy, average power, peak power, and peak power differential are equally important to improve reliability ...
Saraju P. Mohanty, N. Ranganathan
PROCEDIA
2010
89views more  PROCEDIA 2010»
14 years 4 months ago
A mimetic tensor artificial viscosity method for arbitrary polyhedral meshes
We construct a new mimetic tensor artificial viscosity on general polyhedral meshes. The tensor viscosity is designed as a discretization of the differential operator div (u) with...
Konstantin Lipnikov, Mikhail J. Shashkov
VLDB
2006
ACM
172views Database» more  VLDB 2006»
15 years 10 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone