Sciweavers

1402 search results - page 146 / 281
» Personalized privacy preservation
Sort
View
93
Voted
IADIS
2004
15 years 2 months ago
Collaborative Task Scheduling Method Based on Social Network Analysis for Cellphone Application
This paper proposes a collaborative approach for personal task management which is modeled as an alliance model. Alliance model is based on information sharing and collaboration o...
Ikki Ohmukai, Hideaki Takeda
WWW
2007
ACM
16 years 1 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
80
Voted
EDBT
2010
ACM
110views Database» more  EDBT 2010»
15 years 7 months ago
The hardness and approximation algorithms for l-diversity
The existing solutions to privacy preserving publication can be classified into the theoretical and heuristic categories. The former guarantees provably low information loss, whe...
Xiaokui Xiao, Ke Yi, Yufei Tao
119
Voted
ISI
2008
Springer
15 years 7 days ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
112
Voted
TDHMS
2010
14 years 11 months ago
Color Based Tracing in Real-Life Surveillance Data
For post incident investigation a complete reconstruction of an event is needed based on surveillance footage of the crime scene and surrounding areas. Reconstruction of the wherea...
Michael J. Metternich, Marcel Worring, Arnold W. M...