Sciweavers

224 search results - page 24 / 45
» Interactive anonymization of sensitive data
Sort
View
MHCI
2009
Springer
14 years 3 months ago
SeCuUI: autocomplete your terminal input
With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. ...
Max-Emanuel Maurer, Alexander De Luca
CHI
1995
ACM
14 years 17 days ago
SageBook: Searching Data-Graphics by Content
Currently, there are many hypertext-like tools and database retrieval systems that use keyword search as a means of navigation. While useful for certain tasks, keyword search is i...
Mei C. Chuah, Steven F. Roth, John Kolojejchick, J...
FOCS
2010
IEEE
13 years 7 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
CCS
2009
ACM
14 years 3 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
KBSE
1995
IEEE
14 years 17 days ago
A Transformation System for Interactive Reformulation of Design Optimization Strategies
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
Thomas Ellman, John Keane, Takahiro Murata, Mark S...