Sciweavers

1422 search results - page 212 / 285
» Information security and risk management
Sort
View
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 2 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
14 years 1 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
GEOINFO
2007
13 years 10 months ago
The Development of a Large Scale Geospatial Telecommunications Application Independent from GIS
This article presents the evolution of a very large geospatial database and application developed for telecommunications outside plant management. The needs for the construction of...
Eliane Z. Victorelli Dias, Geovane Cayres Magalh&a...
ITICSE
2004
ACM
14 years 2 months ago
The backwash effect on SQL skills grading
This paper examines the effect of grading approaches for SQL query formulation on students’ learning strategies. The way that students are graded in a subject has a significant ...
Julia Coleman Prior, Raymond Lister
SAC
2006
ACM
14 years 2 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya