Sciweavers

17018 search results - page 57 / 3404
» From the How to the What
Sort
View
CACM
2006
192views more  CACM 2006»
13 years 7 months ago
Live forensics: diagnosing your system without killing it first
: Traditional methods of digital forensics analyze a static disk image--a bitstream copy of a disk created while the system is offline. Recent trends--including greatly increased d...
Frank Adelstein
CHI
2010
ACM
14 years 2 months ago
Pico-ing into the future of mobile projector phones
Ten years ago we were on the verge of having cameras built into our mobile phones, but knew very little about what to expect or how they would be used. Now we are faced with the s...
Max L. Wilson, Simon Robinson, Dan Craggs, Kristia...
ECIS
2001
13 years 9 months ago
Visualising and Representing How Organisations Work for a Better Analysis of How IT can Contribute
This research project investigated the relationships between IS staff and other organisational actors in four organisations. Using a network-based approach borrowed from Sociology...
Frédéric Adam
PRICAI
2000
Springer
13 years 11 months ago
Discovery of Shared Topics Networks among People - A Simple Approach to Find Community Knowledge from WWW Bookmarks
In this paper, we propose a system called kMedia that can assist users to form knowledge for community by showing shared topics networks (STN) among them. One of the important aspe...
Hideaki Takeda, Takeshi Matsuzuka, Yuichiro Tanigu...
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 8 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen