Sciweavers

2355 search results - page 129 / 471
» Anonymizing Temporal Data
Sort
View
ICC
2009
IEEE
108views Communications» more  ICC 2009»
14 years 5 months ago
Spatial and Temporal Packet Recovery Schemes for DVB-H Systems through IP-Relay Wireless Networks
—The DVB-H standard has been defined to provide digital video broadcast to mobile handheld devices. However, without a request channel, a handheld device may encounter data loss...
Wen-Hsin Yang, You-Chiun Wang, Yu-Chee Tseng, Bao-...
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
12 years 5 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
14 years 2 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
GRID
2008
Springer
13 years 9 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 4 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai