Sciweavers

796 search results - page 88 / 160
» The Anonymous Subgraph Problem
Sort
View
160
Voted
CONEXT
2009
ACM
15 years 1 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
142
Voted
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 10 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
ASIACRYPT
2001
Springer
15 years 4 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
113
Voted
NECO
1998
151views more  NECO 1998»
15 years 13 days ago
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
We describe a new method for performing a nonlinear form of Principal Component Analysis. By the use of integral operator kernel functions, we can e ciently compute principal comp...
Bernhard Schölkopf, Alex J. Smola, Klaus-Robe...
89
Voted
SOFSEM
2004
Springer
15 years 6 months ago
Discovery of Lexical Entries for Non-taxonomic Relations in Ontology Learning
Ontology learning from texts has recently been proposed as a new technology helping ontology designers in the modelling process. Discovery of non–taxonomic relations is understoo...
Martin Kavalec, Alexander Maedche, Vojtech Sv&aacu...