Sciweavers

269 search results - page 15 / 54
» Novel Algorithms for Privacy Preserving Utility Mining
Sort
View
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 9 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
ICDCSW
2005
IEEE
14 years 29 days ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
CORR
2008
Springer
159views Education» more  CORR 2008»
13 years 7 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
SAC
2006
ACM
14 years 1 months ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 4 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu