Sciweavers

5255 search results - page 161 / 1051
» Formal Methods for Privacy
Sort
View
155
Voted
FMAM
2010
223views Formal Methods» more  FMAM 2010»
15 years 1 months ago
Agile Formality: A Mole of Software Engineering Practices
: Members of the agile programming and formal methods communities do not always see eye-to-eye. These two communities often do not talk to or learn from each other. Only recently, ...
Vieri del Bianco, Dragan Stosic, Joseph R. Kiniry
144
Voted
PODS
2001
ACM
148views Database» more  PODS 2001»
16 years 3 months ago
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms ...
Dakshi Agrawal, Charu C. Aggarwal
FOCS
2010
IEEE
15 years 1 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
KDD
2007
ACM
142views Data Mining» more  KDD 2007»
16 years 4 months ago
Towards Privacy-Preserving Model Selection
Abstract. Model selection is an important problem in statistics, machine learning, and data mining. In this paper, we investigate the problem of enabling multiple parties to perfor...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
AINA
2007
IEEE
15 years 10 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...