Sciweavers

2958 search results - page 8 / 592
» Using Anonymized Data for Classification
Sort
View
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 11 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
13 years 8 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa
ADBIS
2009
Springer
101views Database» more  ADBIS 2009»
14 years 2 months ago
Temporal Data Classification Using Linear Classifiers
Data classification is usually based on measurements recorded at the same time. This paper considers temporal data classification where the input is a temporal database that descri...
Peter Z. Revesz, Thomas Triplet
CSE
2009
IEEE
14 years 5 months ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren
MASS
2010
181views Communications» more  MASS 2010»
13 years 8 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer