Sciweavers

976 search results - page 86 / 196
» Evaluating Adversarial Partitions
Sort
View
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 10 months ago
k-Anonymization Revisited
In this paper we introduce new notions of k-type anonymizations. Those notions achieve similar privacy goals as those aimed by Sweenie and Samarati when proposing the concept of k-...
Aristides Gionis, Arnon Mazza, Tamir Tassa
EDBT
2010
ACM
127views Database» more  EDBT 2010»
14 years 3 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett
INFOCOM
2009
IEEE
14 years 3 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
INFOCOM
2009
IEEE
14 years 3 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
JSSPP
2009
Springer
14 years 3 months ago
Competitive Two-Level Adaptive Scheduling Using Resource Augmentation
Abstract. As multi-core processors proliferate, it has become more important than ever to ensure efficient execution of parallel jobs on multiprocessor systems. In this paper, we s...
Hongyang Sun, Yangjie Cao, Wen-Jing Hsu