Sciweavers

2162 search results - page 48 / 433
» E-Crime Investigative Technologies
Sort
View
IHI
2010
141views Healthcare» more  IHI 2010»
13 years 3 months ago
Towards a definition of health informatics ethics
Information technology is a prominent tool in healthcare management. However, healthcare systems often fall short of addressing concerns about privacy, confidentiality and safety ...
Hamman W. Samuel, Osmar R. Zaïane, Dick Sobse...
CSCW
2012
ACM
12 years 4 months ago
Practices of information and secrecy in a punk rock subculture
By examining the information practices of a punk-rock subculture, we investigate the limits of social media systems, particularly limits exposed by practices of secrecy. Looking a...
Jessica Lingel, Aaron Trammell, Joe Sanchez, Mor N...
IDA
2002
Springer
13 years 8 months ago
Optimization of association rule mining queries
Levelwise algorithms (e.g., the Apriori algorithm) have been proved eective for association rule mining from sparse data. However, in many practical applications, the computation ...
Baptiste Jeudy, Jean-François Boulicaut
SIGMOD
2002
ACM
106views Database» more  SIGMOD 2002»
13 years 8 months ago
A Study on the Management of Semantic Transaction for Efficient Data Retrieval
Mobile computing technology is developing rapidly due to the advantages of information access through mobile devices and the need to retrieve information at remote locations. Howe...
Shi-Ming Huang, Irene S. Y. Kwan, Chih-He Li
CIKM
2010
Springer
13 years 7 months ago
Recommendation based on object typicality
Current recommendation methods are mainly classified into contentbased, collaborative filtering and hybrid methods. These methods are based on similarity measurements among item...
Yi Cai, Ho-fung Leung, Qing Li, Jie Tang, Juanzi L...