-
2
-
-
35348848696
-
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In 16th WWW, pages 181-190, 2007.
-
(2007)
16th WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
4
-
-
33750357681
-
You are what you say: Privacy risks of public mentions
-
D. Frankowski, D. Cosley, S. Sen, L. Terveen, and J. Riedl. You are what you say: Privacy risks of public mentions. In 29th SIGIR, pages 565-572, 2006.
-
(2006)
29th SIGIR
, pp. 565-572
-
-
Frankowski, D.1
Cosley, D.2
Sen, S.3
Terveen, L.4
Riedl, J.5
-
5
-
-
70349239808
-
Private lives: User attitudes towards personal information on the web
-
Technical Report CS-2005-06, Dalhousie University
-
C. Gates and T. Whalen. Private lives: User attitudes towards personal information on the web. Technical Report CS-2005-06, Dalhousie University, 2005.
-
(2005)
-
-
Gates, C.1
Whalen, T.2
-
6
-
-
34247137498
-
Defining a session on web search engines
-
B. J. Jansen, A. Spink, C. Blakely, and S. Koshman. Defining a session on web search engines. JASIST, 58(6):862-871, 2007.
-
(2007)
JASIST
, vol.58
, Issue.6
, pp. 862-871
-
-
Jansen, B.J.1
Spink, A.2
Blakely, C.3
Koshman, S.4
-
7
-
-
63449090629
-
I know what you did last summer - Query logs and user privacy
-
R. Jones, R. Kumar, B. Pang, and A. Tomkins. "I know what you did last summer" - Query logs and user privacy. In 16th CIKM, pages 909-914, 2007.
-
(2007)
16th CIKM
, pp. 909-914
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
8
-
-
33845952637
-
Generating query substitutions
-
R. Jones, B. Rey, O. Madani, and W. Greiner. Generating query substitutions. In 15th WWW, pages 387-396, 2006.
-
(2006)
15th WWW
, pp. 387-396
-
-
Jones, R.1
Rey, B.2
Madani, O.3
Greiner, W.4
-
9
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In 16th WWW, pages 629-638, 2007.
-
(2007)
16th WWW
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
11
-
-
9444274777
-
Comparing clusterings by variation of information
-
M. Meila. Comparing clusterings by variation of information. In 16th COLT, pages 173-187, 2003.
-
(2003)
16th COLT
, pp. 173-187
-
-
Meila, M.1
-
15
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
abstract
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In 17th PODS, page 188, 1998.
-
(1998)
17th PODS
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
16
-
-
77957575893
-
The problem of anonymous vanity searches
-
C. Soghoian. The problem of anonymous vanity searches. SSRN eLibrary, 2007.
-
(2007)
SSRN eLibrary
-
-
Soghoian, C.1
-
17
-
-
36448939407
-
Information re-retrieval: Repeat queries in Yahoo's logs
-
J. Teevan, E. Adar, R. Jones, and M. Potts. Information re-retrieval: Repeat queries in Yahoo's logs. In 30th SIGIR, pages 151-158, 2007.
-
(2007)
30th SIGIR
, pp. 151-158
-
-
Teevan, J.1
Adar, E.2
Jones, R.3
Potts, M.4
|