Sciweavers

872 search results - page 161 / 175
» An Access Control Language for a General Provenance Model
Sort
View
TSMC
2011
228views more  TSMC 2011»
13 years 2 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
SIGSOFT
2005
ACM
14 years 8 months ago
Matching execution histories of program versions
We develop a method for matching dynamic histories of program executions of two program versions. The matches produced can be useful in many applications including software piracy...
Xiangyu Zhang, Rajiv Gupta
WWW
2007
ACM
14 years 8 months ago
GeoTV: navigating geocoded rss to create an iptv experience
The Web is rapidly moving towards a platform for mass collaboration in content production and consumption from three screens: computers, mobile phones, and TVs. While there has be...
Yih-Farn Chen, Giuseppe Di Fabbrizio, David C. Gib...
WWW
2006
ACM
14 years 8 months ago
Living the TV revolution: unite MHP to the web or face IDTV irrelevance!
The union of Interactive Digital TV (IDTV) and Web promotes the development of new interactive multimedia services, enjoyable while watching TV even on the new handheld digital TV...
Stefano Ferretti, Marco Roccetti, Johannes Andrich
UIST
2005
ACM
14 years 1 months ago
A1: end-user programming for web-based system administration
System administrators work with many different tools to manage and fix complex hardware and software infrastructure in a rapidly paced work environment. Through extensive field st...
Eser Kandogan, Eben M. Haber, Rob Barrett, Allen C...