Sciweavers

400 search results - page 56 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 3 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
CCS
2004
ACM
14 years 2 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 9 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
JITECH
2007
136views more  JITECH 2007»
13 years 8 months ago
A computer scientist's reactions to NPfIT
This paper contains a set of personal views relating to NHS Connecting for Health’s National Programme for IT (NPfIT), and in particular its Care Records Service, written from t...
Brian Randell
ACHI
2008
IEEE
14 years 3 months ago
UPOS: User Profile Ontology with Situation-Dependent Preferences Support
—Context-aware adaptive systems aim at automatically personalizing the user’s environment depending on the user’s situation, and hence, minimizing user interaction with the s...
Michael Sutterer, Olaf Droegehorn, Klaus David