Sciweavers

2217 search results - page 413 / 444
» A Data Privacy Taxonomy
Sort
View
146
Voted
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
16 years 4 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
CHI
2008
ACM
16 years 4 months ago
Ingimp: introducing instrumentation to an end-user open source application
Open source projects are gradually incorporating usability methods into their development practices, but there are still many unmet needs. One particular need for nearly any open ...
Michael Terry, Matthew Kay, Brad Van Vugt, Brandon...
125
Voted
STORAGESS
2005
ACM
15 years 9 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
121
Voted
BIOSIG
2007
114views Biometrics» more  BIOSIG 2007»
15 years 5 months ago
Minutiae template conformance and interoperability issues
: Minutiae features extracted from finger images are widely used for automated fingerprint recognition. The conformance of minutiae templates to standardised data interchange forma...
Olaf Henniger, Dirk Scheuermann
142
Voted
SIGKDD
2008
125views more  SIGKDD 2008»
15 years 3 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun