Sciweavers

7059 search results - page 1343 / 1412
» Bayesian network management
Sort
View
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 9 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
EDBT
2002
ACM
141views Database» more  EDBT 2002»
14 years 9 months ago
Efficient OLAP Query Processing in Distributed Data Warehouses
Abstract. The success of Internet applications has led to an explosive growth in the demand for bandwidth from ISPs. Managing an IP network requires collecting and analyzing networ...
Michael O. Akinde, Michael H. Böhlen, Theodor...
MOBISYS
2008
ACM
14 years 8 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
MOBISYS
2008
ACM
14 years 8 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
MOBISYS
2007
ACM
14 years 8 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
« Prev « First page 1343 / 1412 Last » Next »