Sciweavers

128 search results - page 16 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
CCS
2008
ACM
14 years 1 days ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
NDSS
2008
IEEE
14 years 4 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
BIOSURVEILLANCE
2008
Springer
14 years 1 days ago
Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities
Salmonella is among the most common food borne illnesses which may result from consumption of contaminated products. In this paper we model the co-occurrence data between USDA-cont...
Purnamrita Sarkar, Lujie Chen, Artur Dubrawski
BMCBI
2007
163views more  BMCBI 2007»
13 years 10 months ago
Use of genomic DNA control features and predicted operon structure in microarray data analysis: ArrayLeaRNA - a Bayesian approac
Background: Microarrays are widely used for the study of gene expression; however deciding on whether observed differences in expression are significant remains a challenge. Resul...
Carmen Pin, Mark Reuter
ACSAC
2008
IEEE
14 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...