Sciweavers

1005 search results - page 79 / 201
» Privacy Preserving Clustering
Sort
View
VIS
2004
IEEE
138views Visualization» more  VIS 2004»
16 years 2 months ago
Dual Contouring with Topology-Preserving Simplification Using Enhanced Cell Representation
We present a fast, topology-preserving approach for isosurface simplification. The underlying concept behind our approach is to preserve the disconnected surface components in cel...
Nan Zhang 0011, Wei Hong, Arie E. Kaufman
141
Voted
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 3 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
138
Voted
PET
2005
Springer
15 years 6 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...
123
Voted
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
16 years 1 months ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
138
Voted
SACMAT
2006
ACM
15 years 7 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...