Sciweavers

1402 search results - page 181 / 281
» Personalized privacy preservation
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
118
Voted
MOBISYS
2008
ACM
16 years 7 days ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
100
Voted
PERCOM
2006
ACM
16 years 7 days ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...
118
Voted
IWRIDL
2006
ACM
158views Education» more  IWRIDL 2006»
15 years 6 months ago
Document image analysis for digital libraries
Digital Libraries have many forms – institutional libraries for information dissemination, document repositories for recordkeeping, and personal digital libraries for organizing...
Prateek Sarkar
IDEAL
2005
Springer
15 years 6 months ago
Probabilistic Data Generation for Deduplication and Data Linkage
Abstract. In many data mining projects the data to be analysed contains personal information, like names and addresses. Cleaning and preprocessing of such data likely involves dedu...
Peter Christen