Sciweavers

2705 search results - page 151 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
FOCS
2010
IEEE
13 years 8 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
INTERACT
2007
13 years 11 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
JAIR
2010
143views more  JAIR 2010»
13 years 8 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
12 years 23 days ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
KDD
1997
ACM
130views Data Mining» more  KDD 1997»
14 years 2 months ago
Process-Based Database Support for the Early Indicator Method
In Wirth t Reinartz (1996), we introduced the early indicator method, a multi-strategy approach for the efficient prediction of various aspectsof the fault profile of a set of car...
Christoph Breitner, Jörg Schlösser, R&uu...