Sciweavers

455 search results - page 8 / 91
» Differential Privacy in New Settings
Sort
View
PVLDB
2010
104views more  PVLDB 2010»
14 years 8 months ago
Boosting the Accuracy of Differentially Private Histograms Through Consistency
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a...
Michael Hay, Vibhor Rastogi, Gerome Miklau, Dan Su...
PODS
2009
ACM
134views Database» more  PODS 2009»
15 years 10 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
PAMI
2006
111views more  PAMI 2006»
14 years 9 months ago
Global Segmentation and Curvature Analysis of Volumetric Data Sets Using Trivariate B-Spline Functions
This paper presents a method to globally segment volumetric images into regions that contain convex or concave (elliptic) iso-surfaces, planar or cylindrical (parabolic) iso-surfa...
Octavian Soldea, Gershon Elber, Ehud Rivlin
TKDE
2012
227views Formal Methods» more  TKDE 2012»
12 years 12 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
SICHERHEIT
2010
14 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...