Sciweavers

723 search results - page 61 / 145
» Organized Anonymous Agents
Sort
View
CSFW
2004
IEEE
14 years 18 days ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
14 years 9 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ACSC
2008
IEEE
13 years 11 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 1 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
SCFBM
2008
119views more  SCFBM 2008»
13 years 8 months ago
OSPACS: Ultrasound image management system
Background: Ultrasound scanning uses the medical imaging format, DICOM, for electronically storing the images and data associated with a particular scan. Large health care facilit...
Will Stott, Andy Ryan, Ian J. Jacobs, Usha Menon, ...