Sciweavers

1044 search results - page 147 / 209
» A knowledge integration framework for complex network manage...
Sort
View
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 26 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
13 years 6 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
IFIP
1994
Springer
14 years 4 days ago
Trends in Environmental Information Processing
In recent years, systems for processing environmental information have been evolving from research and development systems to practical applications. Today, many of these systems ...
Franz Josef Radermacher, Wolf-Fritz Riekert, Bernd...
SASN
2006
ACM
14 years 2 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...