Sciweavers

903 search results - page 130 / 181
» An Adaptive Privacy Management System for Data Repositories
Sort
View
ECIS
2003
13 years 9 months ago
Towards a stakeholder analysis of information systems development project abandonment
This study adopts a stakeholder analysis to examine stakeholders’ roles and contributions in influencing organizational decisions to abandon information systems (IS) development...
Gary S. C. Pan, Donal J. Flynn
IPPS
1999
IEEE
14 years 11 days ago
Distributed, Scalable, Dependable Real-Time Systems: Middleware Services and Applications
Some classes of real-time systems function in environments which cannot be modeled with static approaches. In such environments, the arrival rates of events which drive transient ...
Lonnie R. Welch, Binoy Ravindran, Paul V. Werme, M...
CIKM
2008
Springer
13 years 10 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 27 days ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
CIDR
2003
125views Algorithms» more  CIDR 2003»
13 years 9 months ago
Crossing the Structure Chasm
It has frequently been observed that most of the world’s data lies outside database systems. The reason is that database systems focus on structured data, leaving the unstructur...
Alon Y. Halevy, Oren Etzioni, AnHai Doan, Zachary ...