Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2217
search results - page 21 / 444
»
A Data Privacy Taxonomy
Sort
relevance
views
votes
recent
update
View
thumb
title
32
click to vote
JDWM
2010
139
views
more
JDWM 2010
»
Mining Frequent Generalized Patterns for Web Personalization in the Presence of Taxonomies
13 years 8 months ago
Download
www.engr.sjsu.edu
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usagebased approach to generate recommendations that ...
Panagiotis Giannikopoulos, Iraklis Varlamis, Magda...
claim paper
Read More »
24
click to vote
CCS
2007
ACM
125
views
Security Privacy
»
more
CCS 2007
»
Provable data possession at untrusted stores
14 years 4 months ago
Download
hssl.cs.jhu.edu
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
claim paper
Read More »
17
click to vote
ISI
2007
Springer
104
views
Security Privacy
»
more
ISI 2007
»
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping
14 years 4 months ago
Download
www.cs.brown.edu
Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingha...
claim paper
Read More »
27
click to vote
SP
2005
IEEE
96
views
Security Privacy
»
more
SP 2005
»
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
14 years 3 months ago
Download
csg.csail.mit.edu
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
claim paper
Read More »
16
click to vote
CCS
2010
ACM
154
views
Security Privacy
»
more
CCS 2010
»
An opportunistic authority evaluation scheme for data security in crisis management scenarios
13 years 10 months ago
Download
www.doc.ic.ac.uk
Enrico Scalavino, Giovanni Russello, Rudi Ball, Va...
claim paper
Read More »
« Prev
« First
page 21 / 444
Last »
Next »