Sciweavers

656 search results - page 114 / 132
» Noiseless Database Privacy
Sort
View
LREC
2008
121views Education» more  LREC 2008»
13 years 11 months ago
The IFADV Corpus: a Free Dialog Video Corpus
Research into spoken language has become more visual over the years. Both fundamental and applied research have progressively included gestures, gaze, and facial expression. Corpo...
Rob van Son, Wieneke Wesseling, Eric Sanders, Henk...
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
13 years 11 months ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 2 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 12 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
ICDE
2007
IEEE
158views Database» more  ICDE 2007»
14 years 11 months ago
Efficient Evaluation of Imprecise Location-Dependent Queries
In location-based services, it is common for a user to issue a query based on his/her current position. One such example is "find the available cabs within two miles of my cu...
Jinchuan Chen, Reynold Cheng