Sciweavers

656 search results - page 116 / 132
» Noiseless Database Privacy
Sort
View
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
14 years 5 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
DEXAW
2009
IEEE
139views Database» more  DEXAW 2009»
14 years 4 months ago
Improving Web Page Retrieval Using Search Context from Clicked Domain Names
Abstract—Search context is a crucial factor that helps to understand a user’s information need in ad-hoc Web page retrieval. A query log of a search engine contains rich inform...
Rongmei Li
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
14 years 4 months ago
Modeling Quality of Information in Multi-sensor Surveillance Systems
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 4 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
DEXAW
2006
IEEE
129views Database» more  DEXAW 2006»
14 years 4 months ago
Interaction Styles for Service Discovery in Mobile Business Applications
As the power of mobile devices continues to grow, and the range of resources accessible via wireless networks expands, there is an increasing need to offer services to users in a ...
Markus Aleksy, Colin Atkinson, Philipp Bostan, Tho...