Sciweavers

515 search results - page 23 / 103
» Measuring Voter-Controlled Privacy
Sort
View
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 5 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
15 years 9 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
15 years 6 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
14 years 9 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
WPES
2005
ACM
15 years 5 months ago
Peripheral privacy notifications for wireless networks
This study aims to develop techniques for allowing users to form more accurate expectations of privacy. We have developed a peripheral display for notifying users when their compu...
Braden Kowitz, Lorrie Faith Cranor