Sciweavers

10670 search results - page 92 / 2134
» Required Information Release
Sort
View
UAI
2007
15 years 3 months ago
Aggregating Across Multiple Levels of Granularity to Meet Customer and Organizational Query Requirements
A research organization responds to a variety of customer requests. Each high level request is broken down into a set of low level requests. For each low level request, the resear...
Suzanne M. Mahoney
TIT
2008
187views more  TIT 2008»
15 years 1 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
16 years 2 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
IEEEARES
2009
IEEE
15 years 8 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
CSMR
2007
IEEE
15 years 2 months ago
A Case Study of Defect-Density and Change-Density and their Progress over Time
We have performed an empirical case study, investigating defect-density and change-density of a reusable framework compared with one application reusing it over time at a large Oi...
Anita Gupta, Odd Petter N. Slyngstad, Reidar Conra...