Sciweavers

661 search results - page 29 / 133
» Robustness Guarantees for Anonymity
Sort
View
EDBT
2004
ACM
234views Database» more  EDBT 2004»
14 years 11 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 5 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
CCS
2008
ACM
14 years 25 days ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
ICASSP
2011
IEEE
13 years 2 months ago
Worst-case based robust adaptive beamforming for general-rank signal models using positive semi-definite covariance constraint
In this paper, we develop a new approach to the robust beamforming for general-rank signal models. Our method is based on the worst-case performance optimization using a semi-de n...
Haihua Chen, Alex B. Gershman
SIAMCO
2000
83views more  SIAMCO 2000»
13 years 10 months ago
Maximally Robust Controllers for Multivariable Systems
The set of all optimal controllers which maximize a robust stability radius for unstructured additive perturbations may be obtained using standard Hankel-norm approximation methods...
S. K. Gungah, G. D. Halikias, Imad M. Jaimoukha