Sciweavers

1335 search results - page 204 / 267
» Privacy in Database Publishing
Sort
View
136
Voted
SAC
2006
ACM
15 years 10 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
GIS
2006
ACM
15 years 4 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
SIGMOD
2006
ACM
122views Database» more  SIGMOD 2006»
16 years 4 months ago
MonetDB/XQuery: a fast XQuery processor powered by a relational engine
Relational XQuery systems try to re-use mature relational data management infrastructures to create fast and scalable XML database technology. This paper describes the main featur...
Peter A. Boncz, Torsten Grust, Maurice van Keulen,...
SIGMOD
2003
ACM
136views Database» more  SIGMOD 2003»
16 years 4 months ago
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters
Most relational query optimizers make use of information about the costs of accessing tuples and data structures on various storage devices. This information can at times be off b...
Frederick Reiss, Tapas Kanungo