Sciweavers

1128 search results - page 10 / 226
» Structuring anonymity metrics
Sort
View
ICDM
2006
IEEE
127views Data Mining» more  ICDM 2006»
14 years 1 months ago
Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching
In recent years, a major thread of research on kanonymity has focused on developing more flexible generalization schemes that produce higher-quality datasets. In this paper we in...
Tiancheng Li, Ninghui Li
ICASSP
2007
IEEE
14 years 1 months ago
A Structural Similarity Metric for Video Based on Motion Models
Quality assessment plays a very important role in almost all aspects of multimedia signal processing such as acquisition, coding, display, processing etc. Several objective qualit...
Kalpana Seshadrinathan, Alan C. Bovik
METRICS
2003
IEEE
14 years 25 days ago
Using Service Utilization Metrics to Assess the Structure of Product Line Architectures
Metrics have long been used to measure and evaluate software products and processes. Many metrics have been developed that have lead to different degrees of success. Software arch...
André van der Hoek, Ebru Dincel, Nenad Medv...
PVLDB
2008
116views more  PVLDB 2008»
13 years 7 months ago
Anonymizing bipartite graph data using safe groupings
Private data often comes in the form of associations between entities, such as customers and products bought from a pharmacy, which are naturally represented in the form of a larg...
Graham Cormode, Divesh Srivastava, Ting Yu, Qing Z...
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...