Sciweavers

770 search results - page 99 / 154
» Privacy Preserving Joins
Sort
View
CHI
2006
ACM
16 years 7 days ago
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applicati
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as th...
Karen P. Tang, Pedram Keyani, James Fogarty, Jason...
CSCW
1998
ACM
15 years 4 months ago
Evaluating Image Filtering Based Techniques in Media Space Applications
Media space applications that promote informal awareness in an organization confront an inevitable paradox: the shared video connections between offices and rooms that promote inf...
Qiang Alex Zhao, John T. Stasko
PVLDB
2008
146views more  PVLDB 2008»
14 years 11 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
PODS
2011
ACM
229views Database» more  PODS 2011»
14 years 2 months ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 2 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke