Sciweavers

738 search results - page 12 / 148
» Privacy Protection for Speech Information
Sort
View
GIS
2009
ACM
14 years 8 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
14 years 1 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh
COLCOM
2007
IEEE
14 years 2 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
ICPR
2004
IEEE
14 years 8 months ago
Stealth Vision for Protecting Privacy
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...
Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita
PERVASIVE
2007
Springer
14 years 1 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...