Sciweavers

5255 search results - page 166 / 1051
» Formal Methods for Privacy
Sort
View
237
Voted
GIS
2009
ACM
16 years 4 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
108
Voted
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
168
Voted
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 5 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
124
Voted
FCA
2005
Springer
201views Formal Methods» more  FCA 2005»
15 years 9 months ago
A Survey of Formal Concept Analysis Support for Software Engineering Activities
Formal Concept Analysis (FCA) has typically been applied in the field of software engineering to support software maintenance and object-oriented class identification tasks. This...
Thomas Tilley, Richard Cole, Peter Becker 0002, Pe...
ICCV
2009
IEEE
16 years 8 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...