Sciweavers

367 search results - page 28 / 74
» The Return of the Sensitivity Attack
Sort
View
ECIS
2003
13 years 9 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 1 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
ICTAI
2010
IEEE
13 years 5 months ago
On the Role of Preferences in Argumentation Frameworks
The aim of this paper is to study how preferences, which are used to model intrinsic strengths of arguments, can be used in argumentation. We show that they play two roles: i) to r...
Leila Amgoud, Srdjan Vesic
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
14 years 8 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare
ACSAC
2010
IEEE
13 years 5 months ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...