Sciweavers

3674 search results - page 116 / 735
» Information Dependencies
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 3 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
CASSIS
2004
Springer
14 years 2 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
COMPSAC
2005
IEEE
13 years 10 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu
SIGIR
2009
ACM
14 years 3 months ago
Predicting user interests from contextual information
Search and recommendation systems must include contextual information to effectively model users’ interests. In this paper, we present a systematic study of the effectiveness of...
Ryen W. White, Peter Bailey, Liwei Chen
ECIS
2011
12 years 8 months ago
Exploring the contribution of information technology to governance, risk management, and compliance (GRC) initiatives
1 Information technology (IT) has a tremendous impact on the discipline of accounting by introducing new ways of retrieving and processing information about performance deviations ...
Manuel Wiesche, Michael Schermann, Helmut Krcmar