Sciweavers

10670 search results - page 104 / 2134
» Required Information Release
Sort
View
WAIM
2010
Springer
15 years 7 days ago
Detecting Comment Spam through Content Analysis
In the Web 2.0 eras, the individual Internet users can also act as information providers, releasing information or making comments conveniently. However, some participants may spre...
Congrui Huang, Qiancheng Jiang, Yan Zhang
107
Voted
INTERACT
2003
15 years 3 months ago
Project InfoSpace: From Information Managing to Information Representation
: The Desktop metaphor has repeatedly been declared antiquated in various ways. It nevertheless continues existing. Despite the widely pronounced critique, it is still not clear wh...
Pamela Ravasio, Ljiljana Vukelja, Gabrio Rivera, M...
149
Voted
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 3 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
JLP
2008
134views more  JLP 2008»
15 years 1 months ago
Backwards type analysis of asynchronous method calls
Asynchronous method calls have been proposed to better integrate object orientation with distribution. In the Creol language, asynchronous method calls are combined with so-called...
Einar Broch Johnsen, Ingrid Chieh Yu
129
Voted
ISI
2008
Springer
15 years 1 months ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...