Sciweavers

528 search results - page 8 / 106
» What Can We Learn Privately
Sort
View
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 8 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 8 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 11 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
BCSHCI
2008
13 years 9 months ago
Can technology-rich spaces support multiple uses?
A number of technology-rich spaces have been designed and created over the last few years with the purpose of supporting and enhancing learning, collaboration, community participa...
Nadia Pantidi, Hugh Robinson, Yvonne Rogers
ITS
2000
Springer
108views Multimedia» more  ITS 2000»
13 years 11 months ago
Is What You Write What You Get?: An Operational Model of Training Scenario
To meet the needs for large-scale, high-quality learning contents, needless to say, we have to sharpen authoring tools. Authoring process can be roughly divided into two phases, a ...
Yusuke Hayashi, Mitsuru Ikeda, Kazuhisa Seta, Osam...