• Aucun résultat trouvé

[PDF] Top 20 Trading Optimality for Performance in Location Privacy

Has 10000 "Trading Optimality for Performance in Location Privacy" found on our website. Below are the top 20 most common "Trading Optimality for Performance in Location Privacy".

Trading Optimality for Performance in Location Privacy

Trading Optimality for Performance in Location Privacy

... points in X it is necessary and sufficient to have R ≥ ...which, for fixed R, is O(n 2 ) (n being the number of locations in ...introduced in (2), which in turn depends on R and ...case ... Voir le document complet

3

Quantifying Interdependent Privacy Risks with Location Data

Quantifying Interdependent Privacy Risks with Location Data

... online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names ... Voir le document complet

19

Trust-Aware Peer Sampling: Performance and Privacy Tradeoffs

Trust-Aware Peer Sampling: Performance and Privacy Tradeoffs

... information in the form of ...geographical location, and whatever other in- formation the user wishes to ...represent, for example, URLs, words, or ...keyword in a profile is also ... Voir le document complet

30

Privacy-preserving and secure location authentication

Privacy-preserving and secure location authentication

... cons for each of the approach that we have enumerated ...a location proof can request the other surrounding users to generate such location ...low performance of cell phones, this was not the ... Voir le document complet

128

Designing Location Privacy Mechanisms for flexibility over time and space

Designing Location Privacy Mechanisms for flexibility over time and space

... improvements in performance are possi- ble in three directions, that we leave as future ...working in privacy poor areas, like in the country, the algorithm spends a considerable ... Voir le document complet

117

Rank optimality for the Burer-Monteiro factorization

Rank optimality for the Burer-Monteiro factorization

... establishes, in particular statistical regimes, where Problem ( SDP ) has a rank-1 solution, that all second- order critical points of Problem ( Factorized SDP ) with p = 2 are global ...). For problems ... Voir le document complet

45

Speech privacy criteria for closed rooms in terms of Speech Privacy Class (SPC) values

Speech privacy criteria for closed rooms in terms of Speech Privacy Class (SPC) values

... Speech Privacy Class ...that for each situation ...level in equation (6) is quite high, it will not occur very often and the room will have a reasonably high degree of speech ...criterion for ... Voir le document complet

11

Optimality Conditions for Piecewise-Convex Maximization Problems

Optimality Conditions for Piecewise-Convex Maximization Problems

... Unit´e de recherche INRIA Lorraine, Technopˆole de Nancy-Brabois, Campus scientifique, ` NANCY 615 rue du Jardin Botanique, BP 101, 54600 VILLERS LES Unit´e de recherche INRIA Rennes, Ir[r] ... Voir le document complet

24

PARAOPT: A parareal algorithm for optimality systems

PARAOPT: A parareal algorithm for optimality systems

... dynamics in a neighborhood of the local min- ima obtained with Newton (top) and Gauss-Newton ...more for L < 10; in fact, without decomposing the time domain, the sequential version of our solver ... Voir le document complet

32

Are Star Funds Really Shining? Cross-trading And Performance Shifting In Mutual Fund Families

Are Star Funds Really Shining? Cross-trading And Performance Shifting In Mutual Fund Families

... provided in previous studies is suggestive of the existence of oppor- tunistic performance shifting via cross-trades, it does not necessary rule out three alternative ...trade in the right direction ... Voir le document complet

66

Using Privacy Policies to Protect Privacy in UBICOMP

Using Privacy Policies to Protect Privacy in UBICOMP

... user’s privacy policies are compatible with its ...devices in the environment as determined by the user’s privacy ...clauses in his/her policy are incompatible and consequently, with which ... Voir le document complet

8

Designing for privacy in the learning environment

Designing for privacy in the learning environment

... schools, the older wing of the Devotion school has ample space in the classrooms alone (+ 1100 s.f.) not counting ancilliary spaces (project areas, group rooms). Rooms i[r] ... Voir le document complet

111

On Bellman&#039;s Optimality Principle for zs-POSGs

On Bellman's Optimality Principle for zs-POSGs

... As for a number of Dec-POMDP solvers, our approach adopts the viewpoint not of a player, but of a central (of- fline) planner that prescribes individual strategies to the players [30], which allows turning a ... Voir le document complet

19

Metrics for Differential Privacy in Concurrent Systems

Metrics for Differential Privacy in Concurrent Systems

... proposed for privacy protection in the context of statisti- cal databases, differential privacy is now widely adopted in various models of ...computation. In this paper we ... Voir le document complet

23

Visualization for Privacy Compliance

Visualization for Privacy Compliance

... flows in organizations in order to identify vulnerabilities that can lead to privacy legislation ...a privacy rights management architecture whose purpose is to uphold an individual’s rights ... Voir le document complet

7

The role of location and social strength for friendship prediction in location-based social networks

The role of location and social strength for friendship prediction in location-based social networks

... present in the datasets analyzed in this study, we use them since they meet the requirements explained previously in Section ...used in the state-of-the-art in order to propose a ... Voir le document complet

28

Selecting Walls for Speech Privacy

Selecting Walls for Speech Privacy

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. Research Report (National Research Council of ... Voir le document complet

28

Private data discovery for privacy compliance in collaborative environments

Private data discovery for privacy compliance in collaborative environments

... with privacy legislation and/or organizational privacy policies is ...leaks. In the face of the collaborative and distributed nature of work within organizations to- day, important challenges arise ... Voir le document complet

11

Privacy Support for Sensitive Data Sharing in P2P Systems

Privacy Support for Sensitive Data Sharing in P2P Systems

... data privacy, privacy preferences, P2P data sharing, ...consider Privacy-Preserving Applications (PPA) those that manage sensitive or confidential data ...information). In general, PPAs are ... Voir le document complet

6

Optimality, stochasticity, and variability in motor behavior.

Optimality, stochasticity, and variability in motor behavior.

... bias. In fact, errors are measured relative to the estimated state of the system which need not in general be similar to the real ...account for motor variability in some experimental ... Voir le document complet

36

Show all 10000 documents...