Sciweavers

2958 search results - page 111 / 592
» Using Anonymized Data for Classification
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 8 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CORR
2000
Springer
83views Education» more  CORR 2000»
15 years 2 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
NAR
1998
92views more  NAR 1998»
15 years 2 months ago
5S rRNA Data Bank
In this paper we present the updated version of the compilation of 5S rRNA and 5S rDNA nucleotide sequences. It contains 1622 primary structures of 5S rRNAs and 5S rRNA genes from...
Maciej Szymanski, Thomas Specht, Miroslawa Z. Barc...
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 2 months ago
Large Margin Multiclass Gaussian Classification with Differential Privacy
As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealin...
Manas A. Pathak, Bhiksha Raj
136
Voted
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 6 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann