Sciweavers

5255 search results - page 299 / 1051
» Formal Methods for Privacy
Sort
View
139
Voted
KDD
2004
ACM
163views Data Mining» more  KDD 2004»
16 years 5 months ago
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods
We consider the problem of improving named entity recognition (NER) systems by using external dictionaries--more specifically, the problem of extending state-of-the-art NER system...
William W. Cohen, Sunita Sarawagi
148
Voted
ASWC
2008
Springer
15 years 6 months ago
ROC: A Method for Proto-ontology Construction by Domain Experts
Abstract. Ontology construction is a labour-intensive and costly process. Even though many formal and semi-formal vocabularies are available, creating an ontology for a specific ap...
Nicole J. J. P. Koenderink, Mark van Assem, J. Lar...
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
16 years 5 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton
133
Voted
CIKM
2009
Springer
15 years 11 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill