Sciweavers

909 search results - page 27 / 182
» Reversible data hiding
Sort
View
CIKM
2006
Springer
14 years 21 days ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
DKE
2008
124views more  DKE 2008»
13 years 9 months ago
A MaxMin approach for hiding frequent itemsets
In this paper, we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) rel...
George V. Moustakides, Vassilios S. Verykios
IVS
2006
127views more  IVS 2006»
13 years 9 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
ICSM
2000
IEEE
14 years 1 months ago
Recovering Class Diagrams from Data-Intensive Legacy Systems
Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among t...
Giuseppe A. Di Lucca, Anna Rita Fasolino, Ugo de C...
POPL
2004
ACM
14 years 9 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds