Sciweavers

1222 search results - page 237 / 245
» Information extraction challenges in managing unstructured d...
Sort
View
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
GEOS
2007
Springer
14 years 1 months ago
Modeling Spatio-temporal Network Computations: A Summary of Results
Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of...
Betsy George, Shashi Shekhar
COOPIS
2004
IEEE
13 years 11 months ago
A Distributed and Parallel Component Architecture for Stream-Oriented Applications
Abstract. This paper introduces ThreadMill - a distributed and parallel component architecture for applications that process large volumes of streamed (time-sequenced) data, such a...
Paulo Barthelmess, Clarence A. Ellis
JTAER
2007
160views more  JTAER 2007»
13 years 7 months ago
Enabling Knowledge Sharing within e-Government Back-Office Through Ontological Engineering
Nowadays, organizational innovation constitutes the government challenges for providing better and more efficient services to citizens, enterprises or other public offices. E–go...
Graciela Brusa, María Laura Caliusco, Omar ...
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu