Sciweavers

723 search results - page 26 / 145
» Organized Anonymous Agents
Sort
View
NDSS
2007
IEEE
14 years 1 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
AAAI
2008
13 years 10 months ago
ADROIT: Automatic Discourse Relation Organizer of Internet-based Text
The ADROIT system that we are developing allows automatic discourse analysis of information rich natural language texts extracted directly from the web. We use guidelines and rela...
A. S. M. Mahbub Morshed, Mitsuru Ishizuka
SASO
2009
IEEE
14 years 2 months ago
Self-Organization of Patrolling-Ant Algorithms
—We consider here multi-agent patrolling as the task for a group of agents to repeatedly visit all the cells of a discrete environment. Wagner et al. [1] have introduced patrolli...
Arnaud Glad, Olivier Buffet, Olivier Simonin, Fran...
JAMIA
2011
140views more  JAMIA 2011»
12 years 10 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
WPES
2003
ACM
14 years 24 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More