Sciweavers

796 search results - page 79 / 160
» The Anonymous Subgraph Problem
Sort
View
76
Voted
KDD
2007
ACM
121views Data Mining» more  KDD 2007»
16 years 1 months ago
Preserving the Privacy of Sensitive Relationships in Graph Data
Abstract. In this paper, we focus on the problem of preserving the privacy of sensitive relationships in graph data. We refer to the problem of inferring sensitive relationships fr...
Elena Zheleva, Lise Getoor
113
Voted
ADC
2010
Springer
204views Database» more  ADC 2010»
14 years 7 months ago
Systematic clustering method for l-diversity model
Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an eff...
Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxian...
83
Voted
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
15 years 7 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
95
Voted
CEC
2007
IEEE
15 years 7 months ago
Memetic algorithms for inexact graph matching
—The noise-robust matching of two graphs is a hard combinatorial problem with practical importance in several domains. In practical applications, a unique solution for a given in...
Thomas Bärecke, Marcin Detyniecki
74
Voted
AAIM
2007
Springer
116views Algorithms» more  AAIM 2007»
15 years 7 months ago
Solving Generalized Maximum Dispersion with Linear Programming
The Generalized Maximum Dispersion problem asks for a partition of a given graph into p vertex-disjoint sets, each of them having at most k vertices. The goal is to maximize the to...
Gerold Jäger, Anand Srivastav, Katja Wolf