Sciweavers

19 search results - page 4 / 4
» Scope Dominance with Generalized Quantifiers
Sort
View
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 1 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
MINENET
2006
ACM
14 years 7 days ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
SIGECOM
2005
ACM
132views ECommerce» more  SIGECOM 2005»
13 years 12 months ago
Integrating tradeoff support in product search tools for e-commerce sites
In a previously reported user study, we found that users were able to perform decision tradeoff tasks more efficiently and commit considerably fewer errors with the example critiq...
Pearl Pu, Li Chen
CCS
2010
ACM
13 years 6 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...