Sciweavers

796 search results - page 88 / 160
» The Anonymous Subgraph Problem
Sort
View
178
Voted
CONEXT
2009
ACM
15 years 3 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
161
Voted
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
15 years 12 days ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
140
Voted
ASIACRYPT
2001
Springer
15 years 6 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
128
Voted
NECO
1998
151views more  NECO 1998»
15 years 2 months ago
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
We describe a new method for performing a nonlinear form of Principal Component Analysis. By the use of integral operator kernel functions, we can e ciently compute principal comp...
Bernhard Schölkopf, Alex J. Smola, Klaus-Robe...
100
Voted
SOFSEM
2004
Springer
15 years 8 months ago
Discovery of Lexical Entries for Non-taxonomic Relations in Ontology Learning
Ontology learning from texts has recently been proposed as a new technology helping ontology designers in the modelling process. Discovery of non–taxonomic relations is understoo...
Martin Kavalec, Alexander Maedche, Vojtech Sv&aacu...