Sciweavers

1662 search results - page 43 / 333
» Privately Finding Specifications
Sort
View
EGOV
2010
Springer
15 years 1 months ago
Siblings of a Different Kind: E-Government and E-Commerce
This paper reports on the last phase of a longitudinal exploratory study, which aims to compare similarities and differences between e-Commerce and eGovernment. In two stages, we ...
Karine Barzilai-Nahon, Hans Jochen Scholl
153
Voted
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
15 years 1 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
CODES
2004
IEEE
15 years 7 months ago
System-on-chip validation using UML and CWL
In this paper, a novel method for high-level specification and validation of SoC designs using UML is proposed. UML is introduced as a formal model of specification for SoC design...
Qiang Zhu, Ryosuke Oishi, Takashi Hasegawa, Tsuneo...
324
Voted

Tutorial
2179views
17 years 3 months ago
Privacy in Location-Based Services: State-of-the-Art and Research Directions
The explosive growth of location-detection devices (e.g., GPS-like devices and handheld devices) along with wireless communications and mobile databases results in realizing locati...
Mohamed F. Mokbel
136
Voted
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 3 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...