Sciweavers

206 search results - page 19 / 42
» On the tradeoff between privacy and utility in data publishi...
Sort
View
IM
2007
13 years 9 months ago
Compass: Cost of Migration-aware Placement in Storage Systems
— We investigate methodologies for placement and migration of logical data stores in virtualized storage systems leading to optimum system configuration in a dynamic workload sc...
Akshat Verma, Upendra Sharma, Rohit Jain, Koustuv ...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 7 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...
ICDM
2003
IEEE
115views Data Mining» more  ICDM 2003»
14 years 25 days ago
On Precision and Recall of Multi-Attribute Data Extraction from Semistructured Sources
Machine learning techniques for data extraction from semistructured sources exhibit different precision and recall characteristics. However to date the formal relationship between...
Guizhen Yang, Saikat Mukherjee, I. V. Ramakrishnan
WWW
2009
ACM
14 years 8 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
CCR
2010
133views more  CCR 2010»
13 years 7 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...