-
1
-
-
49749093156
-
Participatory sensing
-
November
-
J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. Srivastava, "Participatory sensing," in Proceedings of the World Sensor Web Workshop, in conjunction with ACM Sensys 2006, November 2006.
-
(2006)
Proceedings of the World Sensor Web Workshop, in Conjunction with ACM Sensys 2006
-
-
Burke, J.1
Estrin, D.2
Hansen, M.3
Parker, A.4
Ramanathan, N.5
Reddy, S.6
Srivastava, M.7
-
2
-
-
70350551971
-
People-centric urban sensing
-
New York, NY, USA: ACM
-
A. T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo, and R. A. Peterson, "People-centric urban sensing," in WICON'06: Proceedings of the 2nd annual international workshop on Wireless internet. New York, NY, USA: ACM, 2006, p. 18.
-
(2006)
WICON'06: Proceedings of the 2nd Annual International Workshop on Wireless Internet
, pp. 18
-
-
Campbell, A.T.1
Eisenman, S.B.2
Lane, N.D.3
Miluzzo, E.4
Peterson, R.A.5
-
3
-
-
79959892958
-
The bikenet mobile sensing system for cyclist experience mapping
-
S. B. Eisenman et al., "The bikenet mobile sensing system for cyclist experience mapping," in Proc. of SenSys, 2007, pp. 87-101.
-
(2007)
Proc. of SenSys
, pp. 87-101
-
-
Eisenman, S.B.1
-
4
-
-
34247356882
-
CarTel: A distributed mobile sensor computing system
-
DOI 10.1145/1182807.1182821, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
-
B. Hull et al., "Cartel: a distributed mobile sensor computing system," in Proc. of SenSys, 2006, pp. 125-138. (Pubitemid 47168682)
-
(2006)
SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
, pp. 125-138
-
-
Hull, B.1
Bychkovsky, V.2
Zhang, Y.3
Chen, K.4
Goraczko, M.5
Miu, A.6
Shih, E.7
Balakrishnan, H.8
Madden, S.9
-
5
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. of ICDM, 2003, p. 99.
-
(2003)
Proc. of ICDM
, pp. 99
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
6
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du, and B. Chen, "Deriving private information from randomized data," in Proc. ACM SIGMOD, 2005, pp. 37-48.
-
(2005)
Proc. ACM SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
7
-
-
84866489655
-
Poolview: Stream privacy for grassroots participatory sensing
-
R. K. Ganti, N. Pham, Y. Tsai, and T. F. Abdelzaher, "Poolview: Stream privacy for grassroots participatory sensing," in Proc. of SenSys, 2008, pp. 281-294.
-
(2008)
Proc. of SenSys
, pp. 281-294
-
-
Ganti, R.K.1
Pham, N.2
Tsai, Y.3
Abdelzaher, T.F.4
-
8
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," Journal of the American Statistical Association, vol. 60, no. 309, pp. 63-69, 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
9
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew, "A data distortion by probability distribution," ACM Trans. Database Syst., vol. 10, no. 3, pp. 395-411, 1985.
-
(1985)
ACM Trans. Database Syst.
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
11
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. of ACM SIGMOD, 2001, pp. 247-255.
-
(2001)
Proc. of ACM SIGMOD
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
12
-
-
85024429815
-
A new approach to linear filtering and prediction problems
-
no. Series D
-
R. E. Kalman, "A new approach to linear filtering and prediction problems," Transactions of the ASME-Journal of Basic Engineering, vol. 82, no. Series D, pp. 35-45, 1960.
-
(1960)
Transactions of the ASME-Journal of Basic Engineering
, vol.82
, pp. 35-45
-
-
Kalman, R.E.1
-
14
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, p. 3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
15
-
-
79960907469
-
Kanonymity
-
Springer
-
V. Ciriani, S. D. C. di Vimercati, S. Foresti, and P. Samarati, "kanonymity," in Secure Data Management in Decentralized Systems. Springer, 2007, pp. 323-353.
-
(2007)
Secure Data Management in Decentralized Systems
, pp. 323-353
-
-
Ciriani, V.1
Vimercati, S.D.C.D.2
Foresti, S.3
Samarati, P.4
-
16
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982, pp. 160-164.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
17
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
B. Pinkas, "Cryptographic techniques for privacy-preserving data mining," SIGKDD Explor. Newsl., vol. 4, no. 2, pp. 12-19, 2002.
-
(2002)
SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
18
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explor. Newsl., vol. 4, no. 2, pp. 28-34, 2002.
-
(2002)
SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
19
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
New York, NY, USA: ACM
-
W. Du and M. J. Atallah, "Secure multi-party computation problems and their applications: a review and open problems," in NSPW'01: Proceedings of the 2001 workshop on New security paradigms. New York, NY, USA: ACM, 2001, pp. 13-22.
-
(2001)
NSPW'01: Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
21
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
New York, NY, USA: ACM
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in KDD'02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2002, pp. 639-644.
-
(2002)
KDD'02: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
22
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. on Knowl. and Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. on Knowl. and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
23
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney and L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, p. 2002, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, pp. 2002
-
-
Sweeney, L.1
Sweeney, L.2
-
25
-
-
0017960331
-
On the capacity of channels with additive non-gaussian noise
-
S. Ihara, "On the capacity of channels with additive non-gaussian noise," Information and Control, vol. 37, no. 1, pp. 34-39, 1978.
-
(1978)
Information and Control
, vol.37
, Issue.1
, pp. 34-39
-
-
Ihara, S.1
-
26
-
-
0035504557
-
The worst additive noise under a covariance constraint
-
S. N. Diggavi and T. M. Cover, "The worst additive noise under a covariance constraint," IEEE Transactions on Information Theory, vol. 47, no. 7, pp. 3072-3081, 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 3072-3081
-
-
Diggavi, S.N.1
Cover, T.M.2
-
27
-
-
0030106462
-
Semidefinite programming
-
L. Vandenberghe and S. Boyd, "Semidefinite programming," SIAM Rev., vol. 38, no. 1, pp. 49-95, 1996.
-
(1996)
SIAM Rev.
, vol.38
, Issue.1
, pp. 49-95
-
-
Vandenberghe, L.1
Boyd, S.2
-
28
-
-
0033295027
-
Sdpt3 - A matlab software package for semidefinite programming
-
K. C. Toh, M. Todd, R. T, and R. H. Tutuncu, "Sdpt3 - a matlab software package for semidefinite programming," Optimization Methods and Software, vol. 11, pp. 545-581, 1998.
-
(1998)
Optimization Methods and Software
, vol.11
, pp. 545-581
-
-
Toh, K.C.1
Todd, M.2
Tutuncu, R.H.3
-
29
-
-
33645668464
-
YALMIP : A toolbox for modeling and optimization in MATLAB
-
Taipei, Taiwan, [Online]. Available
-
J. Lofbert, "YALMIP : A toolbox for modeling and optimization in MATLAB," in Proceedings of the CACSD Conference, Taipei, Taiwan, 2004. [Online]. Available: http://control.ee.ethz.ch/joloef/yalmip.php.
-
(2004)
Proceedings of the CACSD Conference
-
-
Lofbert, J.1
-
31
-
-
77958555287
-
-
http://www.obdii.com/.
-
-
-
|