Sciweavers

5255 search results - page 178 / 1051
» Formal Methods for Privacy
Sort
View
141
Voted
FLAIRS
1998
15 years 5 months ago
A Formal Framework for the Objective Evaluation of Edge Detectors
Edge detection is one of the most-studied problems in the field of computervision. However,there is no standard method of objectively and accurately evaluating the performance of ...
Sean Dougherty, Kevin W. Bowyer
161
Voted
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
16 years 4 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
138
Voted
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 10 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
119
Voted
SECRYPT
2010
129views Business» more  SECRYPT 2010»
15 years 1 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
118
Voted
CHI
2004
ACM
16 years 4 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard