Examples of using Narayanan in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Expert Author: Seth Narayanan.
Narayanan( Bobby) Kasthuri Ph D MD University of Chicago.
Chapter 6 in relationship to the Encore study Burnett and Feamster 2015 Narayanan and Zevenbergen 2015.
Narayanan(Bobby) Kasthuri, Ph.D., MD, University of Chicago and Argonne National Labs.
For more about privacy and data release in open calls, see Narayanan, Huey, and Felten(2016) and the discussion in chapter 6.
Gordon and Narayanan(1984) examined the relationships between environmental uncertainty, organizational structure and the use of information systems.
Such invisible third-party page requests are actually quite common on the web(Narayanan and Zevenbergen 2015), but they rarely involve explicit attempts to measure censorship.
For example, imagine a researcher who wishes to study the Bitcoin blockchain(Bitcoin is a crypto-currency and the blockchain is a public record of all Bitcoin transactions(Narayanan et al. 2016)).
Written by Sandeep Nair Narayanan, Anupam Joshi and Sudip Mittal, University of Maryland.
For more on theconcept of personally identifying information(PII), which is central to many of the rules about research ethics, see Narayanan and Shmatikov(2010) and Schwartz and Solove(2011).
I'd like to thank Arvind Narayanan for helping me focus and refine the arguments in the book over many wonderful lunches.
Such a signing statement had never beenused before at SIGCOMM, and this case has led to additional debate by computer scientists about the nature of ethics in their research(Narayanan and Zevenbergen 2015).
Just two weeks after the data were released, Arvind Narayanan and Vitaly Shmatikov(2008) showed that it was possible to learn about specific people's movie preferences.
However, the revised version of Encore- which only triggered requests to Twitter, Facebook, and YouTube- was minimal risk because requests to those sites are triggered during normal web browsing(Narayanan and Zevenbergen 2015).
In new work with Ansh Shukla,Sharad Goel and Arvind Narayanan, we show that these anonymous web browsing records can in fact often be tied back to real-world identities.
One exception is B. Jones and Feamster(2015), which considers the case of measurement ofInternet censorship(a topic I discuss in chapter 6 in relationship to the Encore study(Burnett and Feamster 2015; Narayanan and Zevenbergen 2015)).
Just two weeks after the data were released, Arvind Narayanan and Vitaly Shmatikov(2008) showed that it was possible to learn about specific people's movie preferences.
Also, I have not seen much research about refining treatments to make them less harmful; one exception is B. Jones and Feamster(2015),which considers the case of measurement of Internet censorship(a topic I discuss in chapter 6 in relationship to the Encore study(Burnett and Feamster 2015; Narayanan and Zevenbergen 2015)).
In addition to this kind of targeted attack focused on a single person, Narayanan and Shmatikov also showed that it was possible to do a broad attack-one involving many people-by merging the Netflix data with personal and movie rating data that some people have chosen to post on the Internet Movie Database(IMDb).
In addition to this kind of targeted attack focused on a single person, Narayanan and Shmatikov also showed that it was possible to do a broad attack- one involving many people- by merging the Netflix data with personal and movie rating data that some people have chosen to post on the Internet Movie Database(IMDb).
In addition to this kind of targeted attack focused on a single person, Narayanan and Shmatikov(2008) also showed that it was possible to do a broad attack- one involving many people- by merging the Netflix data with personal and movie rating data that some people have chosen to post on the Internet Movie Database(IMDb).