Sciweavers

5009 search results - page 936 / 1002
» Data Mining Support in Database Management Systems
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
GIS
2007
ACM
14 years 10 months ago
Where were we: communities for sharing space-time trails
We consider trails to be a document type of growing importance, authored in abundance as locative technologies become embedded in mobile devices carried by billions of humans. As ...
Scott Counts, Marc Smith
IAT
2007
IEEE
14 years 3 months ago
TIBOR: A Resource-bounded Information Foraging Agent for Visual Analytics
Visual Analytics is the science of applying reasoning and analysis techniques to large, complex real-world data for problem solving using visualizations. Real world knowledge gath...
Dingxiang Liu, Anita Raja, Jayasri Vaidyanath
COMPUTER
2008
66views more  COMPUTER 2008»
13 years 9 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 10 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...