Sciweavers

453 search results - page 26 / 91
» From Individuals to Social and Vice-versa
Sort
View
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
14 years 11 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
INFFUS
2006
100views more  INFFUS 2006»
13 years 9 months ago
Social contraction and belief negotiation
An intelligent agent may receive information about its environment from several different sources. How should the agent merge these items of information into a single, consistent ...
Richard Booth
PVLDB
2008
146views more  PVLDB 2008»
13 years 9 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...
ASUNAM
2010
IEEE
13 years 11 months ago
Fast Discovery of Reliable Subnetworks
Abstract--We present a novel and efficient algorithm, PATH COVERING, for solving the most reliable subgraph problem. A reliable subgraph gives a concise summary of the connectivity...
Petteri Hintsanen, Hannu Toivonen, Petteri Sevon