Sciweavers

2217 search results - page 348 / 444
» A Data Privacy Taxonomy
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Toward worm detection in online social networks
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit un...
Wei Xu, Fangfang Zhang, Sencun Zhu
CCS
2010
ACM
15 years 2 months ago
Assessing trust in uncertain information using Bayesian description logic
Decision makers (humans or software agents alike) are faced with the challenge of examining large volumes of information originating from heterogeneous sources with the goal of as...
Achille Fokoue, Mudhakar Srivatsa, Robert Young
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
15 years 2 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 11 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
SPEECH
2011
14 years 11 months ago
Intelligibility predictors and neural representation of speech
Intelligibility predictors tell us a great deal about human speech perception, in particular which acoustic factors strongly effect human behavior, and which do not. A particular...
Bryce E. Lobdell, Jont B. Allen, Mark Hasegawa-Joh...