Sciweavers

74 search results - page 4 / 15
» Privacy: preserving trajectory collection
Sort
View
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
14 years 1 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
ICCV
2009
IEEE
15 years 15 days ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
WEBI
2005
Springer
14 years 1 months ago
Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data
Collaborative filtering techniques are widely used by many E-commerce sites for recommendation purposes. Such techniques help customers by suggesting products to purchase using o...
Huseyin Polat, Wenliang Du
INFOCOM
2011
IEEE
12 years 11 months ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...