Sciweavers

3395 search results - page 601 / 679
» Computational Differential Privacy
Sort
View
160
Voted
TDSC
2011
14 years 10 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
536
Voted
CVPR
2011
IEEE
1838views Computer Vision» more  CVPR 2011»
15 years 1 months ago
Reconstructing an image from its local descriptors
This paper shows that an image can be approximately reconstructed based on the output of a blackbox local description software such as those classically used for image indexing. Ou...
Philippe Weinzaepfel, Hervé Jégou and Patrick Pe...
153
Voted
PERCOM
2011
ACM
14 years 7 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
191
Voted
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 7 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
142
Voted
CHI
2011
ACM
14 years 7 months ago
HyperSource: bridging the gap between source and code-related web sites
Programmers frequently use the Web while writing code: they search for libraries, code examples, tutorials, and documentation. This link between code and visited Web pages remains...
Björn Hartmann, Mark Dhillon, Matthew K. Chan