Sciweavers

206 search results - page 21 / 42
» On the tradeoff between privacy and utility in data publishi...
Sort
View
SDMW
2009
Springer
14 years 2 months ago
L-Cover: Preserving Diversity by Anonymity
To release micro-data tables containing sensitive data, generalization algorithms are usually required for satisfying given privacy properties, such as k-anonymity and l-diversity....
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 1 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
ICDE
2005
IEEE
90views Database» more  ICDE 2005»
14 years 9 months ago
Distributed XML Stream Filtering System with High Scalability
We propose a distributed XML stream filtering system that uses a large number of subscribers' profiles, written in XPath expressions, to filter XML streams and then publish t...
Hiroyuki Uchiyama, Makoto Onizuka, Takashi Honishi
DATE
2002
IEEE
122views Hardware» more  DATE 2002»
14 years 15 days ago
Exploiting Idle Cycles for Algorithm Level Re-Computing
Although algorithm level re-computing techniques can trade-off the detection capability of Concurrent Error Detection (CED) vs. time overhead, it results in 100% time overhead whe...
Kaijie Wu, Ramesh Karri
DELTA
2010
IEEE
14 years 19 days ago
Independent Component Analysis Applied to Watermark Extraction and its Implemented Model on FPGAs
: Most of published audio watermark algorithms are suffered a trade-off between inaudibility and detectibility, and the detection performance depends greatly on the strength of noi...
Thuong Le-Tien, Dien Vo-Ngoc, Lan Ngo-Hoang, Sung ...