Sciweavers

2817 search results - page 540 / 564
» A Framework for the Management of Information Security
Sort
View
WWW
2010
ACM
14 years 3 months ago
Pusic: musicalize microblog messages for summarization and exploration
Micro-blogging services provide platforms for users to share their feelings and ideas on the go. Desiging to produce information stream in almost micro-blogging services, although...
Cheng-Te Li, Hung-Che Lai, Chien-Tung Ho, Chien-Li...
WWW
2006
ACM
14 years 9 months ago
Detecting online commercial intention (OCI)
Understanding goals and preferences behind a user's online activities can greatly help information providers, such as search engine and E-Commerce web sites, to personalize c...
Honghua (Kathy) Dai, Lingzhi Zhao, Zaiqing Nie, Ji...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
CN
2006
79views more  CN 2006»
13 years 8 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
JSAC
2010
107views more  JSAC 2010»
13 years 7 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar