Sciweavers

1005 search results - page 79 / 201
» Privacy Preserving Clustering
Sort
View
VIS
2004
IEEE
138views Visualization» more  VIS 2004»
15 years 10 days ago
Dual Contouring with Topology-Preserving Simplification Using Enhanced Cell Representation
We present a fast, topology-preserving approach for isosurface simplification. The underlying concept behind our approach is to preserve the disconnected surface components in cel...
Nan Zhang 0011, Wei Hong, Arie E. Kaufman
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
12 years 1 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
PET
2005
Springer
14 years 4 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...
KDD
2008
ACM
162views Data Mining» more  KDD 2008»
14 years 11 months ago
Composition attacks and auxiliary information in data privacy
Privacy is an increasingly important aspect of data publishing. Reasoning about privacy, however, is fraught with pitfalls. One of the most significant is the auxiliary informatio...
Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanat...
SACMAT
2006
ACM
14 years 5 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...