Back to Results
First PageMeta Content
Connectivity / Network theory / Network science / Centrality / Graph theory / Mathematics / Networks


Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography Lars Backstrom Cynthia Dwork
Add to Reading List

Document Date: 2007-02-26 13:32:06


Open Document

File Size: 217,70 KB

Share Result on Facebook

City

Cambridge / Banff / /

Company

LiveJournal / New York Times / Anonymized Social Networks / Online Social Networks / Netflix / INTRODUCTION Anonymized Social Networks / AOL / Microsoft / /

Country

Canada / /

Currency

pence / /

/

Facility

Computer Science Cornell University / Terminal Network Flows / /

IndustryTerm

privacy preserving data mining / privacy-preserving data mining / large social networks / Internet Math / large social network / search trees / social networking sites / undirected released network / privacy preserving data mining algorithms / on-line settings / n-node network / undirected social network / on-line setting / Web graph analysis / recovery algorithm / on-line system / Web crawls / rooted search tree / social networks / search tree / above algorithm / social network / instant messaging network / recovery algorithms / search algorithm / address book network / on-line communities / on-line data sources / anonymous network / ambient network / /

Organization

Institute for the Social Sciences / National Science Foundation / International World Wide Web Conference Committee / D. and Catherine T. MacArthur Foundation / Cornell University / /

Person

Cynthia Dwork Jon Kleinberg / Lars Backstrom Cynthia Dwork Jon / /

/

Position

model for protecting privacy / Problems General / wb / curator / /

Product

RCA H100 Portable Audio Device / Pentax K-x Digital Camera / /

ProvinceOrState

Alberta / /

PublishedMedium

New York Times / /

Technology

cryptography / above algorithm / LAN / following recovery algorithm / H. The recovery algorithm / Weaving technology / search algorithm / same search algorithm / recovery algorithms / data mining / privacy preserving data mining algorithms / instant messaging / same algorithm / recovery algorithm / /

SocialTag