Sciweavers

444 search results - page 30 / 89
» Sensitive state-space exploration
Sort
View
PET
2010
Springer
15 years 3 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
DSS
2007
226views more  DSS 2007»
14 years 11 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
AAAI
2006
15 years 1 months ago
On Multi-Class Cost-Sensitive Learning
Rescaling is possibly the most popular approach to cost-sensitive learning. This approach works by rescaling the classes according to their costs, and it can be realized in differ...
Zhi-Hua Zhou, Xu-Ying Liu
SOUPS
2009
ACM
15 years 6 months ago
Sanitization's slippery slope: the design and study of a text revision assistant
For privacy reasons, sensitive content may be revised before it is released. The revision often consists of redaction, that is, the “blacking out” of sensitive words and phras...
Richard Chow, Ian Oberst, Jessica Staddon
AAAI
2008
15 years 2 months ago
Hierarchical Location and Topic Based Query Expansion
In this paper, we propose a novel approach to expand queries by exploring both location information and topic information of the queries. Users at different locations tend to have...
Shu Huang, Qiankun Zhao, Prasenjit Mitra, C. Lee G...