-
3
-
-
85054466828
-
-
AOL research website, no longer online
-
AOL. AOL research website, no longer online. http://research.aol.com.
-
-
-
-
5
-
-
45749101998
-
Anonymity preserving pattern discovery
-
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, and Dino Pedreschi. Anonymity preserving pattern discovery. VLDB J., 17(4): 703-727, 2008.
-
(2008)
VLDB J.
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
6
-
-
24644466401
-
Query usage mining in search engines
-
A. Scime, editor, Idea Group
-
R. Baeza-Yates. Query usage mining in search engines. In A. Scime, editor, Web Mining: Applications and Techniques, pages 307-321. Idea Group, 2004.
-
(2004)
Web Mining: Applications and Techniques
, pp. 307-321
-
-
Baeza-Yates, R.1
-
7
-
-
24644480149
-
Applications of web query mining
-
D. Losada and J. Fernández-Luna, editors, number 3408 in LNCS, Santiago de Compostela, Spain, March, Springer
-
R. Baeza-Yates. Applications of web query mining. In D. Losada and J. Fernández-Luna, editors, European Conference on Information Retrieval (ECIR’05), number 3408 in LNCS, pages 7-22, Santiago de Compostela, Spain, March 2005. Springer.
-
(2005)
European Conference on Information Retrieval (ECIR’05)
, pp. 7-22
-
-
Baeza-Yates, R.1
-
9
-
-
74549198813
-
Mining search engine query logs via suggestion sampling
-
Ziv Bar-Yossef and Maxim Gurevich. Mining search engine query logs via suggestion sampling. In VLDB 2008, 2008.
-
(2008)
VLDB 2008
-
-
Bar-Yossef, Z.1
Gurevich, M.2
-
10
-
-
80455175487
-
Estimating the impression rank of web pages
-
Ziv Bar-Yossef and Maxim Gurevich. Estimating the impression rank of web pages. In WWW 2009, 2009.
-
(2009)
WWW 2009
-
-
Bar-Yossef, Z.1
Gurevich, M.2
-
11
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
M. Barbaro and T. Zeller. A face is exposed for AOL searcher no. 4417749. New York Times, 2006.
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
12
-
-
70349237629
-
The query-flow graph: Model and applications
-
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Debora Donato, Aristides Gionis, and Sebastiano Vigna. The query-flow graph: model and applications. In CIKM, pages 609-618, 2008.
-
(2008)
CIKM
, pp. 609-618
-
-
Boldi, P.1
Bonchi, F.2
Castillo, C.3
Donato, D.4
Gionis, A.5
Vigna, S.6
-
13
-
-
24144487020
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. Theory of Cryptography Conference, pages 363-385, 2005.
-
(2005)
Theory of Cryptography Conference
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
15
-
-
55149118992
-
A survey of query log privacy-enhancing techniques from a policy perspective
-
Alissa Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. ACM Transactions on the Web (TWeb), 2(4), 2008.
-
(2008)
ACM Transactions on the Web (TWeb)
, vol.2
, Issue.4
-
-
Cooper, A.1
-
16
-
-
79953004326
-
Spelling correction as an iterative process that exploits the collective knowledge of Web users
-
Silviu Cucerzan and Eric Brill. Spelling correction as an iterative process that exploits the collective knowledge of Web users. In EMNLP, 2004.
-
(2004)
EMNLP
-
-
Cucerzan, S.1
Brill, E.2
-
17
-
-
67650033440
-
Probabilistic query expansion using query logs
-
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, and Wei-Ying Ma. Probabilistic query expansion using query logs. In WWW, pages 325-332, 2002.
-
(2002)
WWW
, pp. 325-332
-
-
Cui, H.1
Wen, J.-R.2
Nie, J.-Y.3
Ma, W.-Y.4
-
18
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Cynthia Dwork and Kobbi Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544, 2004.
-
(2004)
CRYPTO
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
19
-
-
79958707212
-
Trackmenot: Resisting surveillance in web search
-
Ian Kerr, Carole Lucock, and Valerie Steeves, editors, Oxford: Oxford University Press, Forthcoming
-
D. Howe and H. Nissenbaum. Trackmenot: Resisting surveillance in web search. In Ian Kerr, Carole Lucock, and Valerie Steeves, editors, On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society. Oxford: Oxford University Press, Forthcoming.
-
On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society
-
-
Howe, D.1
Nissenbaum, H.2
-
20
-
-
63449090629
-
I know what you did last summer: Query logs and user privacy
-
New York, NY, USA, ACM
-
Rosie Jones, Ravi Kumar, Bo Pang, and Andrew Tomkins. I know what you did last summer: query logs and user privacy. In CIKM '07: Proceedings of the sixteenth ACM Conference on Information and Knowledge Management, pages 909-914, New York, NY, USA, 2007. ACM.
-
(2007)
CIKM '07: Proceedings of the sixteenth ACM Conference on Information and Knowledge Management
, pp. 909-914
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
21
-
-
70349248460
-
Vanity fair: Privacy in query log bundles
-
New York, NY, USA, ACM
-
Rosie Jones, Ravi Kumar, Bo Pang, and Andrew Tomkins. Vanity fair: privacy in query log bundles. In CIKM '08: Proceeding of the 17th ACM Conference on Information and Knowledge Management, pages 853-862, New York, NY, USA, 2008. ACM.
-
(2008)
CIKM '08: Proceeding of the 17th ACM Conference on Information and Knowledge Management
, pp. 853-862
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
24
-
-
84865663496
-
Releasing search queries and clicks privately
-
Aleksandra Korolova, Krishnaram Kenthapadi, Nina Mishra, and Alexandros Ntoulas. Releasing search queries and clicks privately. In WWW 2009, pages 171-180, 2009.
-
(2009)
WWW 2009
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
25
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
New York, NY, USA, ACM Press
-
Ravi Kumar, Jasmine Novak, Bo Pang, and Andrew Tomkins. On anonymizing query logs via token-based hashing. InWWW '07: Proceedings of the 16th International Conference on World Wide Web, pages 629-638, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
27
-
-
70349234516
-
Searcher and Mr. Browser: A unified hyperlink-click graph
-
Barbara Poblete, Carlos Castillo, and Aristides Gionis. Dr. Searcher and Mr. Browser: a unified hyperlink-click graph. In CIKM, pages 1123-1132, 2008.
-
(2008)
CIKM
, pp. 1123-1132
-
-
Poblete, B.1
Castillo, C.2
Gionis, A.3
-
29
-
-
41949107359
-
Website privacy preservation for query log publishing
-
Springer
-
Barbara Poblete, Myra Spiliopoulou, and Ricardo Baeza-Yates. Website privacy preservation for query log publishing. In Proceedings of the First SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD’07), Lecture Notes in Computer Science, volume 4890. Springer, 2008.
-
(2008)
Proceedings of the First SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD’07), Lecture Notes in Computer Science
, vol.4890
-
-
Poblete, B.1
Spiliopoulou, M.2
Baeza-Yates, R.3
-
30
-
-
84866629860
-
Query chains: Learning to rank from implicit feedback
-
abs/cs/0605035
-
Filip Radlinski and Thorsten Joachims. Query chains: Learning to rank from implicit feedback. CoRR, abs/cs/0605035, 2006.
-
(2006)
CoRR
-
-
Radlinski, F.1
Joachims, T.2
-
31
-
-
55149100303
-
Learning about the world through long-term query logs
-
Matthew Richardson. Learning about the world through long-term query logs. TWEB, 2(4), 2008.
-
(2008)
TWEB
, vol.2
, Issue.4
-
-
Richardson, M.1
-
32
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Computer Science Laboratory, SRI International
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, Computer Science Laboratory, SRI International, 1998.
-
(1998)
Technical report
-
-
Samarati, P.1
Sweeney, L.2
-
33
-
-
0035517699
-
Protecting respondents’ identities in microdata release
-
Pierangela Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6): 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
34
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
ACM Press
-
Pierangela Samarati and Latanya Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 1-3, 1998, Seattle, Washington, page 188. ACM Press, 1998.
-
(1998)
Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 1-3, 1998, Seattle, Washington
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
37
-
-
0002028942
-
CEO and CIO perspectives on competitive intelligence
-
Richard G. Vedder, Michael T. Vanecek, C. Stephen Guynes, and James J. Cappel. CEO and CIO perspectives on competitive intelligence. Commun. ACM, 42(8): 108-116, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.8
, pp. 108-116
-
-
Vedder, R.G.1
Vanecek, M.T.2
Guynes, S.C.3
Cappel, J.J.4
-
38
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33(1): 50-57, 2004.
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
39
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner. Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 1965.
-
(1965)
Journal of the American Statistical Association
-
-
Warner, S.L.1
-
41
-
-
0038590968
-
Competitive intelligence through data mining public sources
-
Alessandro Zanasi. Competitive intelligence through data mining public sources. Competitive Intelligence Review, 9(1): 44-54, 1998.
-
(1998)
Competitive Intelligence Review
, vol.9
, Issue.1
, pp. 44-54
-
-
Zanasi, A.1
-
42
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
Elena Zheleva and Lise Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In WWW 2009, 2009.
-
(2009)
WWW 2009
-
-
Zheleva, E.1
Getoor, L.2
|