Sciweavers

666 search results - page 42 / 134
» Collaborative Planning With Privacy
Sort
View
SIGSOFT
2006
ACM
14 years 9 months ago
Local analysis of atomicity sphere for B2B collaboration
Atomicity is a desirable property for business processes to conduct transactions in Business-to-Business (B2B) collaboration. Although it is possible to reason about atomicity of ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
14 years 9 months ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
IDTRUST
2009
ACM
14 years 3 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
IDA
2011
Springer
13 years 3 months ago
PSO driven collaborative clustering: A clustering algorithm for ubiquitous environments
Abstract. The goal of this article is to introduce a collaborative clustering approach to the domain of ubiquitous knowledge discovery. This clustering approach is suitable in peer...
Benoît Depaire, Rafael Falcón, Koen V...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay