Sciweavers

5255 search results - page 164 / 1051
» Formal Methods for Privacy
Sort
View
CHI
2010
ACM
15 years 8 months ago
Moving beyond untagging: photo privacy in a tagged world
Photo tagging is a popular feature of many social network sites that allows users to annotate uploaded images with those who are in them, explicitly linking the photo to each pers...
Andrew Besmer, Heather Richter Lipford
MEMOCODE
2010
IEEE
15 years 1 months ago
A formal executable semantics of Verilog
This paper describes a formal executable semantics for the Verilog hardware description language. The goal of our formalization is to provide a concise and mathematically rigorous...
Patrick O'Neil Meredith, Michael Katelman, Jos&eac...
123
Voted
CHI
2010
ACM
15 years 10 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
118
Voted
ICDE
2006
IEEE
165views Database» more  ICDE 2006»
15 years 9 months ago
Privacy Preserving Clustering on Horizontally Partitioned Data
Data mining has been a popular research area for more than a decade due to its vast spectrum of applications. The power of data mining tools to extract hidden information that can...
Ali Inan, Yücel Saygin, Erkay Savas, Ay&ccedi...
120
Voted
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...