Sciweavers

224 search results - page 19 / 45
» Interactive anonymization of sensitive data
Sort
View
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 6 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
BMCBI
2008
90views more  BMCBI 2008»
13 years 9 months ago
Ortholog-based protein-protein interaction prediction and its application to inter-species interactions
Background: The rapid growth of protein-protein interaction (PPI) data has led to the emergence of PPI network analysis. Despite advances in high-throughput techniques, the intera...
Sheng-An Lee, Chen-hsiung Chan, Chi-Hung Tsai, Jin...
WSC
1998
13 years 10 months ago
LABATCH.2: Software for Statistical Analysis of Simulation Sample Path Data
LABATCH.2 is a collection of computer programs available in C, FORTRAN, and SIMSCRIPT II.5 by anonymous ftp, at http://www.or.unc.edu/gfish/labatch.2.html. It performs statistical...
George S. Fishman
HUC
2010
Springer
13 years 10 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon