Sciweavers

528 search results - page 18 / 106
» What Can We Learn Privately
Sort
View
MLDM
2010
Springer
13 years 2 months ago
The Impact of Experimental Setup in Prepaid Churn Prediction for Mobile Telecommunications: What to Predict, for Whom and Does t
Prepaid customers in mobile telecommunications are not bound by a contract and can therefore change operators (`churn') at their convenience and without notification. This mak...
Dejan Radosavljevik, Peter van der Putten, Kim Kyl...
CHI
2005
ACM
14 years 8 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
MDM
2007
Springer
123views Communications» more  MDM 2007»
14 years 1 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
SYNTHESE
2008
82views more  SYNTHESE 2008»
13 years 7 months ago
Kripke's paradox and the Church-Turing thesis
Kripke (1982, Wittgenstein on rules and private language. Cambridge, MA: MIT Press) presents a rule-following paradox in terms of what we meant by our past use of "plus",...
Mark D. Sprevak
IEEEARES
2008
IEEE
14 years 2 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin