Sciweavers

1422 search results - page 241 / 285
» Information security and risk management
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
CIKM
2006
Springer
14 years 18 days ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
DEBU
2000
90views more  DEBU 2000»
13 years 8 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner
EUROSYS
2007
ACM
14 years 6 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
SIGDOC
2004
ACM
14 years 2 months ago
Intellectual property aspects of web publishing
This paper addresses how intellectual property affects the Web in general, and content publishing on the Web in particular. Before its commercialization, the Web was perceived as ...
Holger M. Kienle, Daniel M. Germán, Scott R...