Sciweavers

3395 search results - page 16 / 679
» Computational Differential Privacy
Sort
View
CHI
2006
ACM
13 years 11 months ago
Privacy and HCI: methodologies for studying privacy issues
Sameer Patil, Natalia A. Romero, John Karat
EDBT
2012
ACM
225views Database» more  EDBT 2012»
12 years 7 days ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
COMSWARE
2006
IEEE
14 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
AC
2008
Springer
13 years 10 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
MOC
2010
13 years 4 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug