Sciweavers

300 search results - page 19 / 60
» A study on the value of location privacy
Sort
View
CIKM
2007
Springer
14 years 1 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
PERCOM
2011
ACM
12 years 11 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
ISMIS
2005
Springer
14 years 1 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
CHI
2009
ACM
14 years 8 months ago
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust
This paper examines a visual design element unique to situated, hot-spot style, services: locativeness. This is the extent to which the media representing a service relates to its...
Vassilis Kostakos, Ian Oakley
ICSM
2009
IEEE
13 years 5 months ago
Effective and efficient localization of multiple faults using value replacement
We previously presented a fault localization technique called Value Replacement that repeatedly alters the state of an executing program to locate a faulty statement [9]. The tech...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta