Sciweavers

1402 search results - page 119 / 281
» Personalized privacy preservation
Sort
View
103
Voted
ACL
2007
15 years 2 months ago
Semantic Transliteration of Personal Names
Words of foreign origin are referred to as borrowed words or loanwords. A loanword is usually imported to Chinese by phonetic transliteration if a translation is not easily availa...
Haizhou Li, Khe Chai Sim, Jin-Shea Kuo, Minghui Do...
83
Voted
IWSEC
2007
Springer
15 years 7 months ago
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
Abstract. Advertisement dissemination is a promising M-commerce application which exploits the capabilities of mobile ad hoc networks to increase the visibility of the products bei...
Alexandre Viejo, Francesc Sebé, Josep Domin...
82
Voted
AAAI
2006
15 years 2 months ago
Classification Spanning Private Databases
In this paper, we study the classification problem involving information spanning multiple private databases. The privacy challenges lie in the facts that data cannot be collected...
Ke Wang, Yabo Xu, Rong She, Philip S. Yu
145
Voted
VLDB
2002
ACM
147views Database» more  VLDB 2002»
15 years 13 days ago
Hippocratic Databases
The Hippocratic Oath has guided the conduct of physicians for centuries. Inspired by its tenet of preserving privacy, we argue that future database systems must include responsibi...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
83
Voted
IPPS
2007
IEEE
15 years 7 months ago
Machine Bank: Own Your Virtual Personal Computer
In this paper, we report the design, implementation and experimental results of Machine Bank, a system engineered towards the popular shared-lab scenario, where users outnumber av...
Shuo Tang, Yu Chen, Zheng Zhang