Sciweavers

2027 search results - page 66 / 406
» Learning and Generalization with the Information Bottleneck
Sort
View
WWW
2007
ACM
15 years 10 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
15 years 10 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
CIKM
2010
Springer
14 years 8 months ago
Utilizing re-finding for personalized information retrieval
Individuals often use search engines to return to web pages they have previously visited. This behaviour, called refinding, accounts for about 38% of all queries. While researcher...
Sarah K. Tyler, Jian Wang, Yi Zhang 0001
CIA
2007
Springer
15 years 4 months ago
Quantifying the Expected Utility of Information in Multi-agent Scheduling Tasks
Abstract. In this paper we investigate methods for analyzing the expected value of adding information in distributed task scheduling problems. As scheduling problems are NP-complet...
Avi Rosenfeld, Sarit Kraus, Charlie Ortiz
DKE
2006
139views more  DKE 2006»
14 years 10 months ago
Information extraction from structured documents using k-testable tree automaton inference
Information extraction (IE) addresses the problem of extracting specific information from a collection of documents. Much of the previous work on IE from structured documents, suc...
Raymond Kosala, Hendrik Blockeel, Maurice Bruynoog...