Sciweavers

796 search results - page 52 / 160
» The Anonymous Subgraph Problem
Sort
View
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
15 years 2 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller
128
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
164
Voted
VLDB
2007
ACM
137views Database» more  VLDB 2007»
16 years 27 days ago
Fast Data Anonymization with Low Information Loss
Recent research studied the problem of publishing microdata without revealing sensitive information, leading to the privacy preserving paradigms of k-anonymity and -diversity. k-a...
Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, ...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
14 years 10 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
192
Voted
VLDB
2008
ACM
147views Database» more  VLDB 2008»
16 years 27 days ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster