-
1
-
-
57349112634
-
User 4xxxxx9: Anonymizing query logs
-
Banff, Alberta, Canada, May 2007
-
E. Adar. User 4xxxxx9: Anonymizing query logs. In Workshop at the WWW '07, Banff, Alberta, Canada, May 2007. WWW.
-
Workshop at the WWW '07
-
-
Adar, E.1
-
2
-
-
35348859539
-
Improving search engines by query clustering
-
R. A. Baeza-Yates, C. A. Hurtado, and M. Mendoza. Improving search engines by query clustering. JASIST, 58(12):1793-1804, 2007.
-
(2007)
JASIST
, vol.58
, Issue.12
, pp. 1793-1804
-
-
Baeza-Yates, R.A.1
Hurtado, C.A.2
Mendoza, M.3
-
3
-
-
74549131507
-
-
M. Barbaro and T. Z. Jr. A face is exposed for aol searcher no. 4417749, Augest 9, 2006. (New York Times).
-
M. Barbaro and T. Z. Jr. A face is exposed for aol searcher no. 4417749, Augest 9, 2006. (New York Times).
-
-
-
-
4
-
-
0034593050
-
Agglomerative clustering of a search engine query log
-
D. Beeferman and A. L. Berger. Agglomerative clustering of a search engine query log. In KDD, pages 407-416, 2000.
-
(2000)
KDD
, pp. 407-416
-
-
Beeferman, D.1
Berger, A.L.2
-
5
-
-
65449160200
-
-
H. Cao, D. Jiang, J. Pei, Q. He, Z. Liao, E. Chen, and H. Li. Context-aware query suggestion by mining click-through and session data. In KDD, pages 875-883. ACM, 2008.
-
H. Cao, D. Jiang, J. Pei, Q. He, Z. Liao, E. Chen, and H. Li. Context-aware query suggestion by mining click-through and session data. In KDD, pages 875-883. ACM, 2008.
-
-
-
-
6
-
-
55149118992
-
A survey of query log privacy-enhancing techniques from a policy perspective
-
A. Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. TWEB, 2(4), 2008.
-
(2008)
TWEB
, vol.2
, Issue.4
-
-
Cooper, A.1
-
7
-
-
33746335051
-
Differential privacy
-
Venice, Italy, July 9-16
-
C. Dwork. Differential privacy. In 33rd International Colloquium on Automata, Languages and Programming (ICALP 2006), pages 1-12, Venice, Italy, July 9-16 2006.
-
(2006)
33rd International Colloquium on Automata, Languages and Programming (ICALP 2006)
, pp. 1-12
-
-
Dwork, C.1
-
9
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, pages 171-180, 2009.
-
(2009)
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
10
-
-
35348838459
-
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In C. L. Williamson, M. E. Zurko, P. F. Patel-Schneider, and P. J. Shenoy, editors, WWW, pages 629-638. ACM, 2007.
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In C. L. Williamson, M. E. Zurko, P. F. Patel-Schneider, and P. J. Shenoy, editors, WWW, pages 629-638. ACM, 2007.
-
-
-
-
11
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
New York, NY, USA, ACM
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS '98, page 188, New York, NY, USA, 1998. ACM.
-
(1998)
PODS '98
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
12
-
-
0036811662
-
-
L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
-
L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
-
-
-
|