Sciweavers

1362 search results - page 250 / 273
» Challenges and Trends in Information Management
Sort
View
CCS
2011
ACM
12 years 8 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICDE
2009
IEEE
148views Database» more  ICDE 2009»
14 years 10 months ago
Probabilistic Inference over RFID Streams in Mobile Environments
Abstract-- Recent innovations in RFID technology are enabling large-scale cost-effective deployments in retail, healthcare, pharmaceuticals and supply chain management. The advent ...
Thanh Tran 0002, Charles Sutton, Richard Cocci, Ya...
WWW
2009
ACM
14 years 9 months ago
Constructing folksonomies from user-specified relations on flickr
Automatic folksonomy construction from tags has attracted much attention recently. However, inferring hierarchical relations between concepts from tags has a drawback in that it i...
Anon Plangprasopchok, Kristina Lerman
WWW
2007
ACM
14 years 9 months ago
Crawling multiple UDDI business registries
As Web services proliferate, size and magnitude of UDDI Business Registries (UBRs) are likely to increase. The ability to discover Web services of interest then across multiple UB...
Eyhab Al-Masri, Qusay H. Mahmoud
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor