Sciweavers

901 search results - page 70 / 181
» On Anonymization of String Data
Sort
View
TMA
2012
Springer
254views Management» more  TMA 2012»
13 years 9 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
16 years 1 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
WEBNET
2000
15 years 2 months ago
An Intelligent User Interface oriented to non-expert users
: This paper presents the design criteria for an Intelligent User Interface to a search engine of an on-line document data base. The Interface is aimed at users that have little or...
Fulvio Corno, Laura Farinetti, Giovanni Squillero
DI
2006
156views more  DI 2006»
15 years 1 months ago
Identifying almost identical files using context triggered piecewise hashing
Fuzzy hashing allows the discovery of potentially incriminating documents that may not be located using traditional hashing methods. The use of the fuzzy hash is much like the fuz...
Jesse D. Kornblum
TVCG
2008
111views more  TVCG 2008»
15 years 1 months ago
Interactive Visual Analysis of Set-Typed Data
While it is quite typical to deal with attributes of different data types in the visualization of heterogeneous, multivariate datasets, most existing techniques still focus on the ...
Wolfgang Freiler, Kresimir Matkovic, Helwig Hauser