Sciweavers

315 search results - page 17 / 63
» Distributed Identity Management Model for Digital Ecosystems
Sort
View
116
Voted
SPIESR
2004
99views Database» more  SPIESR 2004»
15 years 5 months ago
Evaluating the effectiveness of automatic PVR management
A model for evaluating the effectiveness of automatic recording of television programs by digital personal video recorders (PVRs) is presented. The model is used to evaluate the t...
Ketan Mayer-Patel, Wesley Miaw
118
Voted
CIKM
2009
Springer
15 years 10 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
163
Voted
MIDDLEWARE
2007
Springer
15 years 9 months ago
Domain-based context management for dynamic and evolutionary environments
Research in context-aware computing has produced a number of application prototypes, frameworks, middlewares and models for describing context. However, development of ubiquitous ...
Ricardo Couto Antunes da Rocha, Markus Endler
161
Voted
ICSOC
2004
Springer
15 years 9 months ago
Assured service quality by improved fault management
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today’s event correlation mainly addresses the cor...
Andreas Hanemann, Martin Sailer, David Schmitz
146
Voted
ISSTA
2009
ACM
15 years 10 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...