Sciweavers

162 search results - page 14 / 33
» Anonymity for continuous data publishing
Sort
View
VIS
2009
IEEE
235views Visualization» more  VIS 2009»
14 years 8 months ago
CUDA-Accelerated Continuous 2D Scatterplots
In this poster, we present how our previously published method of computing continuous 2D scatterplots can be performed with hardware acceleration on a GPU. By doing this, we expl...
Sven Bachthaler, Steffen Frey, Daniel Weiskopf
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
13 years 5 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 7 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 8 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 5 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp