Sciweavers

208 search results - page 23 / 42
» Relations Among Privacy Notions
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 9 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
IJIS
2011
95views more  IJIS 2011»
13 years 13 days ago
Modeling and reasoning with qualitative comparative clinical knowledge
The number of clinical trials reports is increasing rapidly due to a large number of clinical trials being conducted, it therefore raises an urgent need to utilize the clinical kno...
Jianbing Ma, Weiru Liu, Anthony Hunter
EUROCRYPT
2004
Springer
14 years 2 months ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz
LATA
2009
Springer
14 years 3 months ago
The Fault Tolerance of NP-Hard Problems
We study the effects of faulty data on NP-hard sets. We consider hard sets for several polynomial time reductions, add corrupt data and then analyze whether the resulting sets are...
Christian Glaßer, Aduri Pavan, Stephen D. Tr...
CICLING
2007
Springer
14 years 3 months ago
A Little Known Fact Is ... Answering Other Questions Using Interest-Markers
In this paper, we present an approach to answering “Other” questions using the notion of interest marking terms. “Other” questions have been introduced in the TREC-QA track...
Majid Razmara, Leila Kosseim