Sciweavers

2217 search results - page 355 / 444
» A Data Privacy Taxonomy
Sort
View
WWW
2008
ACM
16 years 5 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
16 years 4 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
15 years 11 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
ICDM
2007
IEEE
97views Data Mining» more  ICDM 2007»
15 years 10 months ago
Supervised Learning by Training on Aggregate Outputs
Supervised learning is a classic data mining problem where one wishes to be be able to predict an output value associated with a particular input vector. We present a new twist on...
David R. Musicant, Janara M. Christensen, Jamie F....
MUE
2007
IEEE
120views Multimedia» more  MUE 2007»
15 years 10 months ago
Design and Implementation of Secure Communication Channels over UPnP Networks
The scale of smart living spaces can be varied from small, e.g. a household, to large, e.g. a building or a campus, scales. As the scale of the space increases, we can expect that...
Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-...