Sciweavers

515 search results - page 19 / 103
» Measuring Voter-Controlled Privacy
Sort
View
122
Voted
EUROISI
2008
15 years 3 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain
CSE
2009
IEEE
15 years 8 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
PVLDB
2008
146views more  PVLDB 2008»
15 years 1 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
149
Voted
SPEECH
2011
14 years 8 months ago
Perception of place of articulation for plosives and fricatives in noise
This study aims at uncovering perceptually-relevant acoustic cues for the labial versus alveolar place of articulation distinction in syllable-initial plosives {/b/,/d/,/p/,/t/} a...
Abeer Alwan, Jintao Jiang, Willa S. Chen
85
Voted
CCS
2006
ACM
15 years 5 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari