Sciweavers

947 search results - page 92 / 190
» Information Security in Mobile Databases
Sort
View
139
Voted
AQUILEIA
2011
88views more  AQUILEIA 2011»
14 years 3 months ago
ICT and Art Heritage: a Project of the University of Udine for the Dissemination of Knowledge
The article illustrates some activities of LIDA, the Information Laboratory for Art History of the University of Udine. It focuses on a regional pilot project on ICT and cultural h...
Donata Levi
146
Voted
OTM
2004
Springer
15 years 9 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
GLOBECOM
2009
IEEE
15 years 10 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
134
Voted
SOUPS
2009
ACM
15 years 10 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
129
Voted
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 9 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...