Sciweavers

698 search results - page 114 / 140
» Privacy Preserving OLAP
Sort
View
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 9 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 9 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
USENIX
2000
13 years 9 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 8 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
TOPLAS
2002
116views more  TOPLAS 2002»
13 years 7 months ago
Type-preserving compilation of Featherweight Java
We present an efficient encoding of core Java constructs in a simple, implementable typed intermediate language. The encoding, after type erasure, has the same operational behavio...
Christopher League, Zhong Shao, Valery Trifonov