Privacy and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For credit card companies to build […]
Archives for June 2014
A Database Aggregate Privacy Guarantee
It is often the case that the data published by an organization or company are too detailed to expect attackers to have accurate partial knowledge. Still, an attacker might have some aggregate or abstract knowledge of a record. Examples like this often arise in practice. For example IMIS is currently involved in anonymizing tax related […]
A TRADITIONAL NAIVE BAYES CLASSIFIER
In this paper, we touch on many areas of research that have been heavily studied. The area of privacy inside a social network encompasses a large breadth, based on how privacy is defined. In authors consider an attack against an anonymized network. In their model, the network consists of only nodes and edges. Trait details […]
Learning Methods on Social Networks
Social networks are online applications that allow their users to connect by means of various link types. As part of their offerings, these networks allow people to list details about themselves that are relevant to the nature of the network. For instance, Facebook is a general-use social network, so individual users list their favorite activities, […]
USER PREFERENCES EXTRACTION AND PRIVACY PRESERVATION
Data has been used in determining the users’ preferences on their search results. Many existing personalized web search systems are based clickthrough data to determine users’ preferences. Mine document preferences from clickthrough data. A spying technique together with a novel voting procedure to determine user preferences. More recently, Introduced an effective approach to predict users’ […]
DIVERSITY AND CONCEPT ENTROPY
A major problem in mobile search is that the interactions between theusers and search engines are limited by the small form factors of the mobile devices. Mobile users tend to submit shorter, hence, more ambiguous queries compared to their web search counterparts. In order to return highly relevant results to the users, mobile search engines […]
SYSTEM DESCRIPTION AND KEY MANAGEMENT
Recent development of the network and computing technology enables many people to easily share their data with others using online external storages. People can share their lives with friends by uploading their private photos or messages into the online social networks such as Facebook and MySpace; or upload highly sensitive personal health records (PHRs) into […]
SIMILAR IMPLICIT NAVIGATION PATHS CONNECTED BY SPECIFIC URL TYPES
Proposed a method for learning regular expression patterns of URLs that lead a crawler from an entry page to target pages. Target pages were found through comparing DOM trees of pages with a pre-selected sample target page. It is very effective but it only works for the specific site from which the sample page is […]
FOCUS A SUPERVISED FORUM CRAWLER
Internet forums are important platforms where users can request and exchange information with others. For example, the Trip Advisor Travel Board is a place where people can ask and share travel tips. Due to the richness of information in forums, researchers are increasingly interested in mining knowledge from them. Tried to mine business intelligence from […]
MERGING AND DISTANCE BROWSING
The information retrieval R-tree (IR2- tree) which is the state of the art for answering the nearest neighbor queries defined explains an alternative solution based on the inverted index. the IR2-tree combines the Rtree with signature files. Next, we will review what is a signature file before explaining the details of IR2-trees. Our discussion assumes […]