Sciweavers

901 search results - page 31 / 181
» On Anonymization of String Data
Sort
View
ISPA
2005
Springer
15 years 3 months ago
The Application of Collaborative Filtering for Trust Management in P2P Communities
The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or
Min Zuo, Kai Wang, Jianhua Li
DKE
2008
106views more  DKE 2008»
14 years 9 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li
82
Voted
CCA
2005
Springer
14 years 11 months ago
Computable Versions of Basic Theorems in Functional Analysis
If one wishes to find out whether a computational problem over discrete data is solvable or how complex it is, the classical approach is to represent the discrete objects in quest...
Atsushi Yoshikawa, Mariko Yasugi
DASFAA
2003
IEEE
151views Database» more  DASFAA 2003»
15 years 2 months ago
Approximate String Matching in DNA Sequences
Approximate string matching on large DNA sequences data is very important in bioinformatics. Some studies have shown that suffix tree is an efficient data structure for approxim...
Lok-Lam Cheng, David Wai-Lok Cheung, Siu-Ming Yiu
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...