Sciweavers

2272 search results - page 184 / 455
» Provable Data Privacy
Sort
View
101
Voted
CCS
2010
ACM
14 years 10 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
106
Voted
IPAW
2010
14 years 10 months ago
Social Web-Scale Provenance in the Cloud
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
Yogesh Simmhan, Karthik Gomadam
81
Voted
MOC
2010
14 years 7 months ago
On interpolation by Planar cubic G2 pythagorean-hodograph spline curves
In this paper, the geometric interpolation of planar data points and boundary tangent directions by a cubic G2 Pythagorean-hodograph (PH) spline curve is studied. It is shown, that...
Gasper Jaklic, Jernej Kozak, Marjeta Krajnc, Vito ...
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
16 years 25 days ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
106
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...