Sciweavers

1464 search results - page 18 / 293
» On optimal anonymization for l -diversity
Sort
View
WWW
2002
ACM
16 years 14 days ago
Optimal crawling strategies for web search engines
Joel L. Wolf, Mark S. Squillante, Philip S. Yu, Ja...
CJ
2006
123views more  CJ 2006»
14 years 12 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
EUROPAR
1997
Springer
15 years 4 months ago
Nova Visualization for Optimization of Data-Parallel Programs
Clinton L. Jeffery, Sandra G. Dykes, Xiaodong Zhan...
CCS
2009
ACM
15 years 6 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
15 years 1 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller