Recent research has demonstrated the utility of using supervised classification systems for automatic identification of low quality microarray data. However, this approach requires...
Brian E. Howard, Beate Sick, Imara Perera, Yang Ju...
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
A consistent theoretical and practical challenge in the design of socio-technical systems is that of motivating users to participate in and contribute to them. This study examines...
Cliff Lampe, Rick Wash, Alcides Velasquez, Elif Oz...
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...