Sciweavers

343 search results - page 51 / 69
» The All-In Publication Policy
Sort
View
SAC
2010
ACM
14 years 4 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
IMC
2003
ACM
14 years 4 months ago
On the number of distributed measurement points for network tomography
Internet topology information is only made available in aggregate form by standard routing protocols. Connectivity information and latency characteristicsmust therefore be inferre...
Joseph Douglas Horton, Alejandro López-Orti...
WPES
2003
ACM
14 years 4 months ago
Preserving privacy when preference searching in e-commerce
The idea of using user preferences to assist with information filtering and with providing the most “relevant” answers to queries has recently received some attention from th...
Rhys Smith, Jianhua Shao
SAC
2009
ACM
14 years 3 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
SIGUCCS
2000
ACM
14 years 3 months ago
Changing the Face of Student Employment in IT at the University of Rochester
Student employees are the lifeblood of many IT organizations, and we often invest a lot of time, energy and resources to ensure their success and ours. Academic Technology Service...
Janak Gada, Jason Wagner