Login / Signup
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary.
Giovanni Iachello
Gregory D. Abowd
Published in:
ACM Trans. Comput. Hum. Interact. (2008)
Keyphrases
</>
preprocessing
privacy preserving
personal information
evaluation methods
neural network
computational cost
statistical databases
privacy violations
significant improvement
high dimensional data
evaluation method
gold standard
security issues
rfid systems
location privacy