Sciweavers

446 search results - page 77 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
SAC
2010
ACM
14 years 26 days ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
EUROSSC
2009
Springer
14 years 2 months ago
Semantic Rules for Context-Aware Geographical Information Retrieval
Geographical information retrieval (GIR) can benefit from context information to adapt the results to a user’s current situation and personal preferences. In this respect, seman...
Carsten Keßler, Martin Raubal, Christoph Wos...
WWW
2005
ACM
14 years 8 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
CIDR
2003
106views Algorithms» more  CIDR 2003»
13 years 9 months ago
Speculative Query Processing
Speculation is an every day phenomenon whereby one acts in anticipation of particular conditions that are likely to hold in the future. Computer science research has seen many suc...
Neoklis Polyzotis, Yannis E. Ioannidis
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri