Sciweavers

198 search results - page 14 / 40
» Weak Probabilistic Anonymity
Sort
View
LFCS
2009
Springer
14 years 4 months ago
Temporalization of Probabilistic Propositional Logic
In this paper we study several properties of the Exogenous Probabilistic Propositional Logic (EPPL), a logic for reasoning about probabilities, with the purpose of introducing a t...
Pedro Baltazar, Paulo Mateus
IROS
2007
IEEE
101views Robotics» more  IROS 2007»
14 years 4 months ago
Optimizing image and camera trajectories in robot vision control using on-line boosting
— In this paper, we present a novel boosted robot vision control algorithm. The method utilizes on-line boosting to produce a strong vision-based robot control starting from two ...
A. H. Abdul Hafez, Enric Cervera, C. V. Jawahar
CCS
2009
ACM
14 years 5 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 10 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
ISECS
2008
IEEE
14 years 4 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel