Sciweavers

903 search results - page 93 / 181
» An Adaptive Privacy Management System for Data Repositories
Sort
View
CCS
2009
ACM
14 years 4 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
14 years 10 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
PVLDB
2010
135views more  PVLDB 2010»
13 years 8 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...
ENVSOFT
2002
129views more  ENVSOFT 2002»
13 years 9 months ago
Linking GIS and water resources management models: an object-oriented method
Many challenges are associated with the integration of geographic information systems (GISs) with models in specific applications. One of them is adapting models to the environmen...
Daene C. McKinney, Ximing Cai
CSREASAM
2010
13 years 7 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...