-
1
-
-
23744504471
-
-
Human-Computer Interaction Series, 6, Kluwer Academic Publishers, Bosto
-
Ardissono L, Kobsa A, Maybury M (2004) Personalized digital television: targeting programs to individual viewers, vol 6, Human-Computer Interaction Series. Kluwer Academic Publishers, Boston
-
(2004)
Personalized digital television: targeting programs to individual viewers
-
-
Ardissono, L.1
Kobsa, A.2
Maybury, M.3
-
3
-
-
33244468835
-
Practical privacy: the SuLQ framework. Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems
-
Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the SuLQ framework. Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. ACM, 128–138
-
(2005)
ACM
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
7
-
-
84992015113
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector
-
Commission E (2002) Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector. Official Journal L 201: 07
-
(2002)
Official Journal L
, vol.201
, pp. 07
-
-
Commission, E.1
-
10
-
-
84992039676
-
Record linkage
-
Liu L, Özsu MT, (eds), Springer, U
-
Domingo-Ferrer J (2009) Record linkage. In: Liu L, Özsu MT (eds) Encyclopedia of database systems. Springer, US, pp 2353–2354
-
(2009)
Encyclopedia of database systems
, pp. 2353-2354
-
-
Domingo-Ferrer, J.1
-
12
-
-
0347229823
-
Scrambled randomized response methods for obtaining sensitive quantitative data
-
Eichhorn BH, Hayre LS (1983) Scrambled randomized response methods for obtaining sensitive quantitative data. J Stat Plan Infer 7:307–316
-
(1983)
J Stat Plan Infer
, vol.7
, pp. 307-316
-
-
Eichhorn, B.H.1
Hayre, L.S.2
-
13
-
-
84860804318
-
An agent based middleware for privacy aware recommender systems in IPTV networks
-
Watada J, Phillips-Wren G, Jain LC, Howlett RJ, (eds), 10, Springer, Berli
-
Elmisery AM, Botvich D (2011) An agent based middleware for privacy aware recommender systems in IPTV networks. In: Watada J, Phillips-Wren G, Jain LC, Howlett RJ (eds) Intelligent decision technologies, vol 10. Springer, Berlin, pp 821–832
-
(2011)
Intelligent decision technologies
, pp. 821-832
-
-
Elmisery, A.M.1
Botvich, D.2
-
19
-
-
84879122636
-
-
243, Ios Press, San Sebastia
-
Elmisery AM, Doolin K, Botvich D (2012) Privacy aware community based recommender service for conferences attendees. 16th international conference on knowledge-based and intelligent information & engineering systems, vol 243. Ios Press, San Sebastian, pp 519–531
-
(2012)
Privacy aware community based recommender service for conferences attendees. 16th international conference on knowledge-based and intelligent information & engineering systems
, pp. 519-531
-
-
Elmisery, A.M.1
Doolin, K.2
Botvich, D.3
-
20
-
-
49049088581
-
Experimental demonstration of a hybrid privacy-preserving recommender system
-
Esma A (2008) Experimental demonstration of a hybrid privacy-preserving recommender system. In: Gilles B, Jose MF, Flavien Serge Mani O, Zbigniew R (eds.) Vol. 0 161–170
-
(2008)
Vol
, pp. 161-170
-
-
Esma, A.1
Gilles, B.2
Jose, M.F.3
Flavien Serge Mani, O.4
Zbigniew, R.5
-
21
-
-
84992133830
-
-
ACM, Sloveni
-
Gemmis MD, Iaquinta L, Lops P, Musto C, Narducci F, Semeraro G (2009) Preference learning in recommender systems. European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD). ACM, Slovenia
-
(2009)
Preference learning in recommender systems. European conference on machine learning and principles and practice of knowledge discovery in databases (ECML/PKDD)
-
-
Gemmis, M.D.1
Iaquinta, L.2
Lops, P.3
Musto, C.4
Narducci, F.5
Semeraro, G.6
-
22
-
-
33749062774
-
FilmTrust: movie recommendations using trust in web-based social networks. Consumer communications and networking conference, 2006. CCNC 2006
-
Golbeck J, Hendler J (2006) FilmTrust: movie recommendations using trust in web-based social networks. Consumer communications and networking conference, 2006. CCNC 2006. 3rd IEEE, Vol. 1 282–286
-
(2006)
3rd IEEE
, vol.1
, pp. 282-286
-
-
Golbeck, J.1
Hendler, J.2
-
24
-
-
78049353321
-
-
Hong T, Tsamis
-
Hong T, Tsamis D (2006) Use of knn for the netflix prize. http://www.stanford.edu/class/cs229/proj2006/HongTsamis-KNNForNetflix.pdf
-
(2006)
Use of knn for the netflix prize
-
-
-
25
-
-
3042819722
-
Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering
-
Huang Z, Chen H, Zeng D (2004) Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans Inf Syst 22:116–142
-
(2004)
ACM Trans Inf Syst
, vol.22
, pp. 116-142
-
-
Huang, Z.1
Chen, H.2
Zeng, D.3
-
29
-
-
84908360438
-
-
Springer, New Yor
-
Jeckmans AJ, Beye M, Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. Social media retrieval. Springer, New York, pp 263–281
-
(2013)
Privacy in recommender systems. Social media retrieval
, pp. 263-281
-
-
Jeckmans, A.J.1
Beye, M.2
Erkin, Z.3
Hartel, P.4
Lagendijk, R.L.5
Tang, Q.6
-
31
-
-
48749116454
-
Platform application technology using the next generation network. Technical Review
-
Kawazoe K, Kakinuma R, Haneda Y, Minoura D, Minamoto S, Ishimoto H (2007) Platform application technology using the next generation network. Technical Review. NTT
-
(2007)
NTT
-
-
Kawazoe, K.1
Kakinuma, R.2
Haneda, Y.3
Minoura, D.4
Minamoto, S.5
Ishimoto, H.6
-
32
-
-
8644249427
-
Implicit feedback for inferring user preference: a bibliography
-
Kelly D, Teevan J (2003) Implicit feedback for inferring user preference: a bibliography. SIGIR Forum 37:18–28
-
(2003)
SIGIR Forum
, vol.37
, pp. 18-28
-
-
Kelly, D.1
Teevan, J.2
-
33
-
-
3042701774
-
Introduction to recommender systems: algorithms and evaluation
-
Konstan JA (2004) Introduction to recommender systems: algorithms and evaluation. ACM Trans Inf Syst (TOIS) 22:1–4
-
(2004)
ACM Trans Inf Syst (TOIS)
, vol.22
, pp. 1-4
-
-
Konstan, J.A.1
-
36
-
-
58349096040
-
Privacy preserving itemset mining through noisy items
-
Lin J-L, Cheng Y-W (2009) Privacy preserving itemset mining through noisy items. Expert Syst Appl 36:5711–5717
-
(2009)
Expert Syst Appl
, vol.36
, pp. 5711-5717
-
-
Lin, J.-L.1
Cheng, Y.-W.2
-
38
-
-
0037789414
-
On the status and contribution of westin’s and altman’s theories of privacy
-
Margulis ST (2003) On the status and contribution of westin’s and altman’s theories of privacy. J Soc Issues 59:411–429
-
(2003)
J Soc Issues
, vol.59
, pp. 411-429
-
-
Margulis, S.T.1
-
42
-
-
24344481949
-
-
ACM, Budapes
-
Nejdl W, Wolpers M, Siberski W, Schmitz C, Schlosser M, Brunkhorst I (2003) Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. Proceedings of the 12th international conference on World Wide Web. ACM, Budapest, pp 536–543
-
(2003)
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks. Proceedings of the 12th international conference on World Wide Web
, pp. 536-543
-
-
Nejdl, W.1
Wolpers, M.2
Siberski, W.3
Schmitz, C.4
Schlosser, M.5
Brunkhorst, I.6
-
43
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis. Proceedings of the thirty-ninth annual ACM symposium on theory of computing
-
Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the thirty-ninth annual ACM symposium on theory of computing. ACM, 75–84
-
(2007)
ACM
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
44
-
-
85047227272
-
Privacy preserving data obfuscation for inherently clustered data
-
Parameswaran R, Blough DM (2008) Privacy preserving data obfuscation for inherently clustered data. Int J Inf Comput Secur 2:4–26
-
(2008)
Int J Inf Comput Secur
, vol.2
, pp. 4-26
-
-
Parameswaran, R.1
Blough, D.M.2
-
45
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the third IEEE international conference on data mining
-
Polat H, Du W (2003) Privacy-preserving collaborative filtering using randomized perturbation techniques. Proceedings of the third IEEE international conference on data mining. IEEE Computer Society625
-
(2003)
IEEE Computer Society625
-
-
Polat, H.1
Du, W.2
-
48
-
-
72249112536
-
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. Proceedings of the third ACM conference on recommender systems
-
Shokri R, Pedarsani P, Theodorakopoulos G, Hubaux J-P (2009) Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. Proceedings of the third ACM conference on recommender systems. ACM, 157–164
-
(2009)
ACM
, pp. 157-164
-
-
Shokri, R.1
Pedarsani, P.2
Theodorakopoulos, G.3
Hubaux, J.-P.4
-
49
-
-
10444271317
-
Data mining, national security, privacy and civil liberties. SIGKDD
-
Thuraisingham B (2002) Data mining, national security, privacy and civil liberties. SIGKDD. Explor Newsl 4:1–5
-
(2002)
Explor Newsl
, vol.4
, pp. 1-5
-
-
Thuraisingham, B.1
-
50
-
-
33645657113
-
-
ACM, Chib
-
Ziegler C-N, McNee SM, Konstan JA, Lausen G (2005) Improving recommendation lists through topic diversification. Proceedings of the 14th international conference on World Wide Web. ACM, Chiba, pp 22–32
-
(2005)
Improving recommendation lists through topic diversification. Proceedings of the 14th international conference on World Wide Web
, pp. 22-32
-
-
Ziegler, C.-N.1
McNee, S.M.2
Konstan, J.A.3
Lausen, G.4
|