Sciweavers

1064 search results - page 96 / 213
» Cryptography from Anonymity
Sort
View
EOR
2007
198views more  EOR 2007»
15 years 3 months ago
Airline crew scheduling from planning to operations
Crew scheduling problems at the planning level are typically solved in two steps: first, creating working patterns, and then assigning these to individual crew. The first step is ...
Claude P. Medard, Nidhi Sawhney
137
Voted
COMCOM
2002
124views more  COMCOM 2002»
15 years 3 months ago
Thin-client Web access patterns: Measurements from a cache-busting proxy
This paper describes a new technique for measuring Web client request patterns and analyzes a large client trace collected using the new method. In this approach a modified proxy ...
Terence Kelly
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 5 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 1 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
16 years 1 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu