Sciweavers

137 search results - page 16 / 28
» Preserving Privacy through Data Generation
Sort
View
SAC
2006
ACM
15 years 5 months ago
Towards value disclosure analysis in modeling general databases
The issue of confidentiality and privacy in general databases has become increasingly prominent in recent years. A key element in preserving privacy and confidentiality of sensi...
Xintao Wu, Songtao Guo, Yingjiu Li
ACSAC
2000
IEEE
15 years 4 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
OTM
2005
Springer
15 years 5 months ago
Mapping Discovery for XML Data Integration
Abstract. The interoperability of heterogeneous data sources is an important issue in many applications such as mediation systems or web-based systems. In these systems, each data ...
Zoubida Kedad, Xiaohui Xue
ICPR
2010
IEEE
14 years 9 months ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 9 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...