Sciweavers

175 search results - page 28 / 35
» Toward Privacy in Public Databases
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 3 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
VLDB
2009
ACM
147views Database» more  VLDB 2009»
14 years 8 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 2 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
ASUNAM
2009
IEEE
13 years 6 months ago
Social Network Analysis as Knowledge Discovery Process: A Case Study on Digital Bibliography
Abstract--Today Digital Bibliographies are a powerful instrument that collects a great amount of data about scientific publications. Digital Bibliographies have been used as basis ...
Michele Coscia, Fosca Giannotti, Ruggero G. Pensa
ER
2007
Springer
130views Database» more  ER 2007»
14 years 2 months ago
Towards Automated Reasoning on ORM Schemes
The goal of this article is to formalize Object Role Modeling (ORM) using the DLR description logic. This would enable automated reasoning on the formal properties of ORM diagrams,...
Mustafa Jarrar