Sciweavers

2355 search results - page 38 / 471
» Anonymizing Temporal Data
Sort
View
SDMW
2009
Springer
14 years 2 months ago
L-Cover: Preserving Diversity by Anonymity
To release micro-data tables containing sensitive data, generalization algorithms are usually required for satisfying given privacy properties, such as k-anonymity and l-diversity....
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
RTCSA
2007
IEEE
14 years 1 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
SAC
2009
ACM
14 years 8 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
JAIR
2006
137views more  JAIR 2006»
13 years 7 months ago
Learning Sentence-internal Temporal Relations
In this paper we propose a data intensive approach for inferring sentence-internal temporal relations. Temporal inference is relevant for practical NLP applications which either e...
Maria Lapata, Alex Lascarides
DEXA
2004
Springer
94views Database» more  DEXA 2004»
14 years 1 months ago
Visualization Process of Temporal Data
Abstract. Temporal data are abundantly present in many application domains such as banking, financial, clinical, geographical applications and so on. Temporal data have been extens...
Chaouki Daassi, Laurence Nigay, Marie-Christine Fa...