Sciweavers

2272 search results - page 182 / 455
» Provable Data Privacy
Sort
View
AAAI
1994
14 years 3 days ago
Applying VC-Dimension Analysis To 3D Object Recognition from Perspective Projections
We analyze the amount of information needed to carry out model-based recognition tasks, in the context of a probabilistic data collection model, and independently of the recogniti...
Michael Lindenbaum, Shai Ben-David
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 10 months ago
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well kn...
Filip Radlinski, Thorsten Joachims
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
12 years 1 months ago
Sampling minimal frequent boolean (DNF) patterns
We tackle the challenging problem of mining the simplest Boolean patterns from categorical datasets. Instead of complete enumeration, which is typically infeasible for this class ...
Geng Li, Mohammed J. Zaki
CCS
2008
ACM
14 years 23 days ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
CCS
2008
ACM
14 years 23 days ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...