Sciweavers

208 search results - page 27 / 42
» Privacy-Preserving Sharing of Sensitive Information
Sort
View
COMSNETS
2012
183views more  COMSNETS 2012»
12 years 3 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
PPOPP
1995
ACM
13 years 11 months ago
High Performance Synchronization Algorithms for Multiprogrammed Multiprocessors
Scalable busy-wait synchronization algorithms are essential for achieving good parallel program performance on large scale multiprocessors. Such algorithms include mutual exclusio...
Robert W. Wisniewski, Leonidas I. Kontothanassis, ...
IJCAI
2007
13 years 9 months ago
On Natural Language Processing and Plan Recognition
The research areas of plan recognition and natural language parsing share many common features and even algorithms. However, the dialog between these two disciplines has not been ...
Christopher W. Geib, Mark Steedman
WWW
2008
ACM
14 years 8 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
JMLR
2010
119views more  JMLR 2010»
13 years 2 months ago
Factorized Orthogonal Latent Spaces
Existing approaches to multi-view learning are particularly effective when the views are either independent (i.e, multi-kernel approaches) or fully dependent (i.e., shared latent ...
Mathieu Salzmann, Carl Henrik Ek, Raquel Urtasun, ...