Sciweavers

3395 search results - page 617 / 679
» Computational Differential Privacy
Sort
View
122
Voted
EDBT
2008
ACM
146views Database» more  EDBT 2008»
16 years 3 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 3 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
PERCOM
2007
ACM
16 years 3 months ago
Making Radio Frequency Identification Visible - A Watchdog Tag
To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...
165
Voted
PERCOM
2007
ACM
16 years 3 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
123
Voted
PERCOM
2006
ACM
16 years 3 months ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...