Sciweavers

1556 search results - page 203 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
CCS
2009
ACM
14 years 5 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ICCS
2009
Springer
14 years 4 months ago
Spatial Relations Analysis by Using Fuzzy Operators
Spatial relations play important role in computer vision, scene analysis, geographic information systems (GIS) and content based image retrieval. Analyzing spatial relations by Fo...
Nadeem Salamat, El-hadi Zahzah
SDMW
2009
Springer
14 years 4 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre
ACHI
2008
IEEE
14 years 4 months ago
Tailoring Model-Based Techniques to Facial Expression Interpretation
Computers have been widely deployed to our daily lives, but human-computer interaction still lacks intuition. Researchers intend to resolve these shortcomings by augmenting tradit...
Matthias Wimmer, Christoph Mayer, Sylvia Pietzsch,...
ICDM
2008
IEEE
143views Data Mining» more  ICDM 2008»
14 years 4 months ago
Exploiting Data Semantics to Discover, Extract, and Model Web Sources
We describe DEIMOS, a system that automatically discovers and models new sources of information. The system exploits four core technologies developed by our group that makes an en...
José Luis Ambite, Craig A. Knoblock, Kristi...