Sciweavers

1402 search results - page 214 / 281
» Personalized privacy preservation
Sort
View
84
Voted
CHI
2007
ACM
16 years 28 days ago
Enhancing ubiquitous computing with user interpretation: field testing the home health horoscope
Domestic ubiquitous computing systems often rely on inferences about activities in the home, but the open-ended, dynamic and heterogeneous nature of the home poses serious problem...
William W. Gaver, Phoebe Sengers, Tobie Kerridge, ...
73
Voted
EDBT
2006
ACM
118views Database» more  EDBT 2006»
16 years 20 days ago
On Honesty in Sovereign Information Sharing
Abstract. We study the following problem in a sovereign informationsharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave hone...
Rakesh Agrawal, Evimaria Terzi
75
Voted
MOBISYS
2003
ACM
16 years 4 days ago
Host Mobility Using an Internet Indirection Infrastructure
We propose the Robust Overlay Architecture for Mobility (ROAM) to provide seamless mobility for Internet hosts. ROAM is built on top of the Internet Indirection Infrastructure (i3...
Shelley Zhuang, Kevin Lai, Ion Stoica, Randy H. Ka...
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
15 years 7 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
98
Voted
ICDE
2009
IEEE
124views Database» more  ICDE 2009»
15 years 7 months ago
An Architecture for Regulatory Compliant Database Management
— Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These...
Soumyadeb Mitra, Marianne Winslett, Richard T. Sno...