Sciweavers

901 search results - page 100 / 181
» On Anonymization of String Data
Sort
View
HOTOS
2003
IEEE
15 years 6 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
BMCBI
2008
107views more  BMCBI 2008»
15 years 1 months ago
Extended Newick: it is time for a standard representation of phylogenetic networks
Background: Phylogenetic trees resulting from molecular phylogenetic analysis are available in Newick format from specialized databases but when it comes to phylogenetic networks,...
Gabriel Cardona, Francesc Rosselló, Gabriel...
JAMIA
2011
104views more  JAMIA 2011»
14 years 4 months ago
Metrics associated with NIH funding: a high-level view
Objective: To introduce the availability of grant-to-article linkage data associated with NIH grants and to perform a high-level analysis of the publication outputs and impacts as...
Kevin W. Boyack, Paul Jordan
WPES
2006
ACM
15 years 7 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
HUC
2010
Springer
15 years 2 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott