Sciweavers

1083 search results - page 196 / 217
» Linking Shared Segments
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 10 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
CHI
2006
ACM
14 years 10 months ago
Design requirements for technologies that encourage physical activity
Overweight and obesity are a global epidemic, with over one billion overweight adults worldwide (300+ million of whom are obese). Obesity is linked to several serious health probl...
Sunny Consolvo, Katherine Everitt, Ian E. Smith, J...
CHI
2006
ACM
14 years 10 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 10 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah