Sciweavers

2272 search results - page 184 / 455
» Provable Data Privacy
Sort
View
CCS
2010
ACM
13 years 8 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
IPAW
2010
13 years 8 months ago
Social Web-Scale Provenance in the Cloud
One of the biggest effects of Web 2.0 and the evolution of the social Web is the commoditization of data. The emergence of applications such as Facebook and Twitter, have lowered t...
Yogesh Simmhan, Karthik Gomadam
MOC
2010
13 years 5 months ago
On interpolation by Planar cubic G2 pythagorean-hodograph spline curves
In this paper, the geometric interpolation of planar data points and boundary tangent directions by a cubic G2 Pythagorean-hodograph (PH) spline curve is studied. It is shown, that...
Gasper Jaklic, Jernej Kozak, Marjeta Krajnc, Vito ...
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
14 years 11 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
ICASSP
2011
IEEE
13 years 2 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...