Sciweavers

498 search results - page 16 / 100
» Being Sensitive to Uncertainty
Sort
View
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
14 years 2 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
STOC
1999
ACM
85views Algorithms» more  STOC 1999»
14 years 8 days ago
A Theorem on Sensitivity and Applications in Private Computation
In this paper we prove a theorem that gives an (almost) tight upper bound on the sensitivity of a multiple-output Boolean function in terms of the sensitivity of its coordinates an...
Anna Gál, Adi Rosén
SC
2004
ACM
14 years 1 months ago
Assessing Fault Sensitivity in MPI Applications
Today, clusters built from commodity PCs dominate high-performance computing, with systems containing thousands of processors now being deployed. As node counts for multi-teraflo...
Charng-da Lu, Daniel A. Reed
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 9 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...