Sciweavers

138 search results - page 15 / 28
» A Probabilistic Approach for Maintaining Trust Based on Evid...
Sort
View
IAT
2008
IEEE
13 years 9 months ago
Structured Learning of Component Dependencies in AmI Systems
As information and communication technologies are becoming an integral part of our homes, the demand for AmI systems with assistive functionality is increasing. A great effort has...
Todor Dimitrov, Josef Pauli, Edwin Naroska, Christ...
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 2 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...
TRUSTBUS
2010
Springer
13 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
CAISE
2006
Springer
14 years 22 days ago
Managing Source Quality Changes in a Data Integration System
This thesis addresses the problem of source quality changes in Data Integration Systems. Its main goal is to propose techniques for maintaining as much as possible the satisfaction...
Adriana Marotta
ACL
2011
13 years 19 days ago
Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis
Community-based knowledge forums, such as Wikipedia, are susceptible to vandalism, i.e., ill-intentioned contributions that are detrimental to the quality of collective intelligen...
Manoj Harpalani, Michael Hart, Sandesh Signh, Rob ...