Sciweavers

206 search results - page 31 / 42
» Statistical Database Modeling for Privacy Preserving Databas...
Sort
View
WWW
2009
ACM
15 years 10 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
CVPR
2010
IEEE
15 years 3 months ago
Towards Semantic Embedding in Visual Vocabulary
Visual vocabulary serves as a fundamental component in many computer vision tasks, such as object recognition, visual search, and scene modeling. While state-of-the-art approaches...
R.-R. Ji, Hongxun Yao, Xiaoshuai Sun
83
Voted
AMAST
2004
Springer
15 years 2 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns
EDBTW
2004
Springer
15 years 2 months ago
Clustering Structured Web Sources: A Schema-Based, Model-Differentiation Approach
Abstract. The Web has been rapidly “deepened” with the prevalence of databases online. On this “deep Web,” numerous sources are structured, providing schema-rich data– Th...
Bin He, Tao Tao, Kevin Chen-Chuan Chang
84
Voted
ACISP
2001
Springer
15 years 1 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito