Sciweavers

901 search results - page 105 / 181
» On Anonymization of String Data
Sort
View
CEC
2008
IEEE
15 years 8 months ago
A Quantum-inspired Genetic Algorithm for data clustering
—The conventional K-Means clustering algorithm must know the number of clusters in advance and the clustering result is sensitive to the selection of the initial cluster centroid...
Jing Xiao, YuPing Yan, Ying Lin, Ling Yuan, Jun Zh...
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 6 months ago
Merging the Results of Approximate Match Operations
Data Cleaning is an important process that has been at the center of research interest in recent years. An important end goal of effective data cleaning is to identify the relatio...
Sudipto Guha, Nick Koudas, Amit Marathe, Divesh Sr...
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
CCS
2008
ACM
15 years 3 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
SIGOPSE
2004
ACM
15 years 7 months ago
The firecracker protocol
We propose the Firecracker protocol for data dissemination in wireless sensor networks. Firecracker uses a combination of routing and broadcasts to rapidly deliver a piece of data...
Philip Levis, David E. Culler