Sciweavers

901 search results - page 146 / 181
» On Anonymization of String Data
Sort
View
TISSEC
2010
72views more  TISSEC 2010»
14 years 11 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
PERCOM
2011
ACM
14 years 5 months ago
Ranges of human mobility in Los Angeles and New York
—The advent of ubiquitous, mobile, personal devices creates an unprecedented opportunity to improve our understanding of human movement. In this work, we study human mobility in ...
Sibren Isaacman, Richard Becker, Ramón C&aa...
DIMVA
2011
14 years 4 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
ICDE
2004
IEEE
90views Database» more  ICDE 2004»
16 years 2 months ago
ItCompress: An Iterative Semantic Compression Algorithm
Real datasets are often large enough to necessitate data compression. Traditional `syntactic' data compression methods treat the table as a large byte string and operate at t...
H. V. Jagadish, Raymond T. Ng, Beng Chin Ooi, Anth...
SI3D
2009
ACM
15 years 8 months ago
Perceptually consistent example-based human motion retrieval
Large amount of human motion capture data have been increasingly recorded and used in animation and gaming applications. Efficient retrieval of logically similar motions from a l...
Zhigang Deng, Qin Gu, Qing Li