Sciweavers

2913 search results - page 381 / 583
» How Much to Copy
Sort
View
PAKDD
2007
ACM
130views Data Mining» more  PAKDD 2007»
14 years 3 months ago
Deriving Private Information from Arbitrarily Projected Data
Distance-preserving projection based perturbation has gained much attention in privacy-preserving data mining in recent years since it mitigates the privacy/accuracy tradeoff by ac...
Songtao Guo, Xintao Wu
PERVASIVE
2007
Springer
14 years 3 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
PERVASIVE
2007
Springer
14 years 3 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
SEMWEB
2007
Springer
14 years 3 months ago
Unlocking the Potential of Public Sector Information with Semantic Web Technology
Abstract. Governments often hold very rich data and whilst much of this information is published and available for re-use by others, it is often trapped by poor data structures, lo...
Harith Alani, David Dupplaw, John Sheridan, Kieron...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 3 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...