Sciweavers

128 search results - page 13 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
SOUPS
2009
ACM
15 years 8 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
ICFP
2010
ACM
15 years 2 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
199
Voted
PODS
2009
ACM
134views Database» more  PODS 2009»
16 years 2 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
ECCV
2010
Springer
15 years 4 months ago
An Oriented Flux Symmetry Based Active Contour Model for Three Dimensional Vessel Segmentation
This paper proposes a novel approach to segment three dimensional curvilinear structures, particularly vessels in angiography, by inspecting the symmetry of image gradients. The pr...
88
Voted
SOUPS
2009
ACM
15 years 8 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs