Sciweavers

3395 search results - page 66 / 679
» Computational Differential Privacy
Sort
View
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 9 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
CHI
2011
ACM
13 years 1 months ago
Social capital on facebook: differentiating uses and users
Though social network site use is often treated as a monolithic activity, in which all time is equally “social” and its impact the same for all users, we examine how Facebook ...
Moira Burke, Robert Kraut, Cameron Marlow
SOUPS
2009
ACM
14 years 4 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 7 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
ICPR
2008
IEEE
14 years 4 months ago
An automatic cell segmentation method for differential interference contrast microscopy
With the huge amount of cell images produced in bio-imaging, automatic methods for segmentation are needed in order to evaluate the content of the images with respect to types of ...
Arjan Kuijper, Bettina Heise